CVE-2022-1607

Cross Site Scripting vulnerability in NE843 Pulsar Plus Controller

Description

Cross-Site Request Forgery (CSRF) vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB Infinity DC Power Plant allows Cross Site Request Forgery.This issue affects Pulsar Plus System Controller NE843_S : comcode 150042936; Infinity DC Power Plant: H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415.

Remediation

Workaround:

  • A workaround is to use the controller’s Read/Write Enable/Disable feature for a network port (NET1,WRE=0). The controller can disable all writes over the network port. The factory default is to have the write capability enabled. However, some customers do not want settings to be remotely changed once systems are set. This feature, when set to Disable, will allow no changes to be accepted. Once set it can only be changed locally through the front panel. ABB has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they can help block known attack vectors. When a workaround reduces functionality, this is identified below as “Impact of workaround”

Category

4.6
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.19%
Vendor Advisory abb.com
Affected: ABB Pulsar Plus System Controller NE843_S
Affected: ABB Infinity DC Power Plant
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-1607?
CVE-2022-1607 has been scored as a medium severity vulnerability.
How to fix CVE-2022-1607?
As a workaround for remediating CVE-2022-1607: A workaround is to use the controller’s Read/Write Enable/Disable feature for a network port (NET1,WRE=0). The controller can disable all writes over the network port. The factory default is to have the write capability enabled. However, some customers do not want settings to be remotely changed once systems are set. This feature, when set to Disable, will allow no changes to be accepted. Once set it can only be changed locally through the front panel. ABB has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they can help block known attack vectors. When a workaround reduces functionality, this is identified below as “Impact of workaround”
Is CVE-2022-1607 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-1607 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-1607?
CVE-2022-1607 affects ABB Pulsar Plus System Controller NE843_S , ABB Infinity DC Power Plant.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.