ABB M2M Gateway Information Disclosure in embedded OpenSSL (CVE-2012-4929)

low Tenable OT Security Plugin ID 503266

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a CRIME attack.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08

http://www.nessus.org/u?310ae51a

http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/

http://code.google.com/p/chromium/issues/detail?id=139744

http://www.nessus.org/u?a1e45597

http://jvn.jp/en/jp/JVN65273415/index.html

http://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000129.html

http://www.nessus.org/u?01785888

http://www.nessus.org/u?e08a4031

http://lists.opensuse.org/opensuse-updates/2012-10/msg00096.html

http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html

http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html

http://marc.info/?l=bugtraq&m=136612293908376&w=2

http://news.ycombinator.com/item?id=4510829

http://rhn.redhat.com/errata/RHSA-2013-0587.html

http://www.nessus.org/u?e9ff26b8

http://support.apple.com/kb/HT5784

http://www.nessus.org/u?7a9e8c0e

http://www.nessus.org/u?91f4784c

http://www.debian.org/security/2012/dsa-2579

http://www.debian.org/security/2013/dsa-2627

http://www.debian.org/security/2015/dsa-3253

http://www.ekoparty.org/2012/thai-duong.php

http://www.iacr.org/cryptodb/data/paper.php?pubkey=3091

http://www.securityfocus.com/bid/55704

http://www.theregister.co.uk/2012/09/14/crime_tls_attack/

http://www.ubuntu.com/usn/USN-1627-1

http://www.ubuntu.com/usn/USN-1628-1

http://www.ubuntu.com/usn/USN-1898-1

https://bugzilla.redhat.com/show_bug.cgi?id=857051

https://chromiumcodereview.appspot.com/10825183

http://www.nessus.org/u?5a2215d0

https://gist.github.com/3696912

https://github.com/mpgn/CRIME-poc

http://www.nessus.org/u?a7aebc43

https://threatpost.com/en_us/blogs/demo-crime-tls-attack-091212

Plugin Details

Severity: Low

ID: 503266

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 5/27/2025

Updated: 5/27/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 4.6

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-4929

Vulnerability Information

CPE: cpe:/o:abb:sw_firmware, cpe:/o:abb:arm600_firmware

Required KB Items: Tenable.ot/ABB

Exploit Ease: No known exploits are available

Patch Publication Date: 9/15/2012

Vulnerability Publication Date: 9/15/2012

Reference Information

CVE: CVE-2012-4929

CWE: 310

ICSA: 25-105-08