The affected versions of S+ Operations (version 2.1 SP1 and previous versions) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
abb symphony \\+ historian 3.0 |
||
abb symphony \\+ historian 3.1 |
||
abb symphony \\+ operations 1.1 |
||
abb symphony \\+ operations 2.0 |
||
abb symphony \\+ operations 2.1 |
||
abb symphony \\+ operations 3.0 |
||
abb symphony \\+ operations 3.1 |
||
abb symphony \\+ operations 3.2 |
||
abb symphony \\+ operations 3.3 |