- What is the severity of CVE-2022-1607?
- CVE-2022-1607 has been scored as a medium severity vulnerability.
- How to fix CVE-2022-1607?
- As a workaround for remediating CVE-2022-1607: A workaround is to use the controller’s Read/Write Enable/Disable feature for a network port (NET1,WRE=0). The controller can disable all writes over the network port. The factory default is to have the write capability enabled. However, some customers do not want settings to be remotely changed once systems are set. This feature, when set to Disable, will allow no changes to be accepted. Once set it can only be changed locally through the front panel. ABB has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they can help block known attack vectors. When a workaround reduces functionality, this is identified below as “Impact of workaround”
- Is CVE-2022-1607 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2022-1607 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-1607?
- CVE-2022-1607 affects ABB Pulsar Plus System Controller NE843_S , ABB Infinity DC Power Plant.