CVE-2024-8036

Unauthorized Modifications of Firmware and Configuration

Description

ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.

Remediation

Workaround:

  • Please follow the guidelines in the following Product Advisory Note to improve the system security: Guidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital Substation Products ( https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288&LanguageCode=en&DocumentP... https://search.abb.com/library/Download.aspx )

Category

4.6
CVSS
Severity: Medium
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.01%
Affected: ABB Relion Protection Relays RE_611 IEC
Affected: ABB Relion Protection Relays REF615 IEC
Affected: ABB Relion Protection Relays REF615 ANSI
Affected: ABB Relion Protection Relays REX615
Affected: ABB Relion Protection Relays REX610
Affected: ABB Relion Protection Relays REX640
Affected: ABB Substation Merging Unit SMU615
Affected: ABB Smart Substation Control and Protection SSC600
Affected: ABB Relion Protection Relays REF615R ANSI
Affected: ABB Relion Protection Relays RED615 IEC
Affected: ABB Relion Protection Relays 615 series IEC
Affected: ABB Relion Protection Relays 615 series CN
Affected: ABB Relion Protection Relays 615 series ANSI
Affected: ABB Relion Protection Relays RER615
Affected: ABB Relion Protection Relays REC615
Affected: ABB RBX615
Affected: ABB RER620 ANSI
Affected: ABB 620 Series IEC/CN
Affected: ABB RE_630
Affected: ABB RIO600
Affected: ABB COM600
Affected: ABB SPA ZC-400
Affected: ABB COM600F ANSI
Affected: ABB SPA ZC-402
Affected: ABB REF542plus
Affected: ABB SUE 3000
Affected: ABB ARG600/ARP600/ARR600/ARC600 single SIM
Affected: ABB ARG600/ARP600 dual SIM
Affected: ABB ARM600
Affected: ABB REC601/RER601
Affected: ABB REC603/RER603
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-8036?
CVE-2024-8036 has been scored as a medium severity vulnerability.
How to fix CVE-2024-8036?
As a workaround for remediating CVE-2024-8036: Please follow the guidelines in the following Product Advisory Note to improve the system security: Guidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital Substation Products ( https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288&LanguageCode=en&DocumentP... https://search.abb.com/library/Download.aspx )
Is CVE-2024-8036 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-8036 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8036?
CVE-2024-8036 affects ABB Relion Protection Relays RE_611 IEC, ABB Relion Protection Relays REF615 IEC, ABB Relion Protection Relays REF615 ANSI, ABB Relion Protection Relays REX615, ABB Relion Protection Relays REX610, ABB Relion Protection Relays REX640, ABB Substation Merging Unit SMU615, ABB Smart Substation Control and Protection SSC600, ABB Relion Protection Relays REF615R ANSI, ABB Relion Protection Relays RED615 IEC, ABB Relion Protection Relays 615 series IEC, ABB Relion Protection Relays 615 series CN, ABB Relion Protection Relays 615 series ANSI, ABB Relion Protection Relays RER615, ABB Relion Protection Relays REC615, ABB RBX615, ABB RER620 ANSI, ABB 620 Series IEC/CN, ABB RE_630, ABB RIO600, ABB COM600, ABB SPA ZC-400, ABB COM600F ANSI, ABB SPA ZC-402, ABB REF542plus, ABB SUE 3000, ABB ARG600/ARP600/ARR600/ARC600 single SIM, ABB ARG600/ARP600 dual SIM, ABB ARM600, ABB REC601/RER601, ABB REC603/RER603.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.