{"vulnerability": "CVE-2024-5154", "sightings": [{"uuid": "1b7facd6-179a-40a3-8410-eaa897d41c34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51540", "type": "seen", "source": "https://t.me/cvedetector/13684", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51540 - Dell ECS Arithmetic Overflow Vulnerability (Path Traversal)\", \n  \"Content\": \"CVE ID : CVE-2024-51540 \nPublished : Dec. 26, 2024, 4:15 p.m. | 35\u00a0minutes ago \nDescription : Dell ECS, versions prior to 3.8.1.3 contains an arithmetic overflow vulnerability exists in retention period handling of ECS. An authenticated user with bucket or object-level access and the necessary privileges could potentially exploit this vulnerability to bypass retention policies and delete objects. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-26T18:14:42.000000Z"}, {"uuid": "10a72781-639c-42b4-af21-f934c65d1be4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51543", "type": "seen", "source": "https://t.me/cvedetector/12093", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51543 - Information Disclosure vulnerabilities allow acces\", \n  \"Content\": \"CVE ID : CVE-2024-51543 \nPublished : Dec. 5, 2024, 1:15 p.m. | 42\u00a0minutes ago \nDescription : Information Disclosure vulnerabilities allow access to application configuration information.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:33.000000Z"}, {"uuid": "caff1430-9a19-4773-bd55-599685ae4346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51544", "type": "seen", "source": "https://t.me/cvedetector/12092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51544 - Service Control vulnerabilities allow access to se\", \n  \"Content\": \"CVE ID : CVE-2024-51544 \nPublished : Dec. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Service Control vulnerabilities allow access to service restart requests and vm configuration settings.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:29.000000Z"}, {"uuid": "94678f53-d8c8-4e3c-8cd7-38f162d80690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51542", "type": "seen", "source": "https://t.me/cvedetector/12091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51542 - Configuration Download vulnerabilities allow acces\", \n  \"Content\": \"CVE ID : CVE-2024-51542 \nPublished : Dec. 5, 2024, 1:15 p.m. | 42\u00a0minutes ago \nDescription : Configuration Download vulnerabilities allow access to dependency configuration information.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:28.000000Z"}, {"uuid": "7fa9f99d-ab79-464b-9011-2579d51e8e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51541", "type": "seen", "source": "https://t.me/cvedetector/12090", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51541 - Local File Inclusion vulnerabilities allow access\", \n  \"Content\": \"CVE ID : CVE-2024-51541 \nPublished : Dec. 5, 2024, 1:15 p.m. | 42\u00a0minutes ago \nDescription : Local File Inclusion vulnerabilities allow access to sensitive system information.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:28.000000Z"}, {"uuid": "d0472b13-668b-4e07-8116-6cf8b0190e60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51549", "type": "seen", "source": "https://t.me/cvedetector/12084", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51549 - Absolute File Traversal vulnerabilities allows ac\", \n  \"Content\": \"CVE ID : CVE-2024-51549 \nPublished : Dec. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Absolute File Traversal  vulnerabilities allows access and modification of un-intended resources.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:20.000000Z"}, {"uuid": "433dc000-4537-4938-93b8-b219f9b7b674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51548", "type": "seen", "source": "https://t.me/cvedetector/12083", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51548 - Dangerous File Upload vulnerabilities allow upload\", \n  \"Content\": \"CVE ID : CVE-2024-51548 \nPublished : Dec. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Dangerous File Upload vulnerabilities allow upload of malicious scripts.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:19.000000Z"}, {"uuid": "8a7bbf35-42e5-4c14-b72b-d9c90f0b5893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51545", "type": "seen", "source": "https://t.me/cvedetector/12095", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51545 - Username Enumeration vulnerabilities allow access\", \n  \"Content\": \"CVE ID : CVE-2024-51545 \nPublished : Dec. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Username Enumeration vulnerabilities allow access to application level username add, delete, modify and list functions.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 10.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:34.000000Z"}, {"uuid": "c4e6bf05-a2a1-4d23-9bca-d9ea90bcc5db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51546", "type": "seen", "source": "https://t.me/cvedetector/12088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51546 - Credentials Disclosure vulnerabilities allow acces\", \n  \"Content\": \"CVE ID : CVE-2024-51546 \nPublished : Dec. 5, 2024, 1:15 p.m. | 41\u00a0minutes ago \nDescription : Credentials Disclosure vulnerabilities allow access to on board project back-up bundles.\u00a0  \nAffected products:  \n  \n  \nABB ASPECT - Enterprise v3.08.02;   \nNEXUS Series v3.08.02;   \nMATRIX Series v3.08.02 \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T15:21:26.000000Z"}, {"uuid": "5073db88-5d89-4423-bad3-2566f8db0975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51540", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113719946286593124", "content": "", "creation_timestamp": "2024-12-26T15:57:53.551560Z"}, {"uuid": "342761af-d727-419a-aafb-236bd8030773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51544", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "e3b22ae7-d6a3-409f-bc96-6ecb0573cba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51549", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "0bcc69f6-1016-4da7-b450-b5440f8f1ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51543", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "88b8edf7-a3d4-4251-a8d7-50592430e0af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51542", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "77046f24-79a3-4c19-a1a5-a8a14675ee48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51541", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "2adf2897-1f32-4d69-8084-007cbdd9b5b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51546", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "6fd1834e-80e7-4aa6-b96a-a5d89c6f32bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhidjtpqad2c", "content": "", "creation_timestamp": "2025-02-06T05:18:35.088873Z"}, {"uuid": "99421483-7b79-468c-be46-383b7db0cd99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-01", "content": "", "creation_timestamp": "2025-02-20T11:00:00.000000Z"}, {"uuid": "d761b0d3-d33d-46aa-9941-fdc23978bb9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/cvedetector/17372", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-51547 - ABB ASPECT-Enterprise/NEXUS Series/MATRIX Series Hard-coded Credentials Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-51547 \nPublished : Feb. 6, 2025, 5:15 a.m. | 3\u00a0hours, 15\u00a0minutes ago \nDescription : Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX Series.This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-06T10:12:39.000000Z"}, {"uuid": "278f8b90-1b48-4995-8fb2-90daf18577a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/ics_cert/1032", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u06a9\u0646\u062a\u0631\u0644 \u0641\u0631\u0622\u06cc\u0646\u062f ABB ASPECT-Enterprise \u0648 \u0645\u06cc\u0627\u0646\u200c\u0627\u0641\u0632\u0627\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0633\u0631\u06cc ABB MATRIX \u0648 NEXUS \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc\u200c\u0634\u062f\u0647 \u0633\u062e\u062a \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u067e\u06cc\u0634 \u0641\u0631\u0636 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\nBDU: 2025-01311\nCVE-2024-51547\n\n\u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f\u060c \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u06a9\u0647 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631. - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0644\u06cc\u0633\u062a \"\u0633\u0641\u06cc\u062f\" \u0627\u0632 \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u06cc\u062f:\nhttps://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A6775&amp;LanguageCode=en&amp;DocumentPartId=pdf%20-%20Public%20Advisory&amp;Action=Launch\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-28T13:35:04.000000Z"}, {"uuid": "a8cbfea6-7539-432b-960c-c1b971b67f7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/ics_cert/1015", "content": "\u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u06a9\u0646\u062a\u0631\u0644 \u0641\u0631\u0622\u06cc\u0646\u062f ABB ASPECT-Enterprise \u0648 \u0633\u06cc\u0633\u062a\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062f\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc ABB MATRIX \u0648 NEXUS \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0647\u0627\u0631\u062f\u06a9\u062f \u0627\u0633\u062a.  \n\u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u067e\u06cc\u0634 \u0641\u0631\u0636 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f.\n\n BDU: 2025-01311\n CVE-2024-51547\n\n \u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f   \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\n \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631.  - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0644\u06cc\u0633\u062a \u0633\u0641\u06cc\u062f \u0622\u062f\u0631\u0633 \u0647\u0627\u06cc IP \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631.\n - \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\n https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A6775&amp;LanguageCode=en&amp;DocumentPartId=pdf%20-%20Public%20Advisory&amp;Action=Launch\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2025-02-11T18:14:38.000000Z"}, {"uuid": "e3a1ef77-9174-4b80-be23-e277d0fe9146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51542", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600428602774282", "content": "", "creation_timestamp": "2024-12-05T13:22:57.877671Z"}, {"uuid": "6db8483d-1f18-4083-b111-13da4700c8e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51545", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600487637214165", "content": "", "creation_timestamp": "2024-12-05T13:37:58.762169Z"}, {"uuid": "719978e7-337e-4e3d-a83f-4ea029d37092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51546", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600487651084599", "content": "", "creation_timestamp": "2024-12-05T13:37:59.141000Z"}, {"uuid": "193f89ba-15fa-4a56-af47-f01ffc62f0db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51541", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600428567221347", "content": "", "creation_timestamp": "2024-12-05T13:22:57.483965Z"}, {"uuid": "a34702ce-5c45-4fd7-b60a-cf07190bf0df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113955018021244992", "content": "", "creation_timestamp": "2025-02-06T04:19:43.264459Z"}, {"uuid": "5d6f8f4a-84f0-4489-b170-a2919862f5b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lhppg5jkdc27", "content": "", "creation_timestamp": "2025-02-09T03:40:02.150982Z"}, {"uuid": "ad3596c0-dda2-46ce-9d38-8475bac497ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51546", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmxigzehlj2c", "content": "", "creation_timestamp": "2025-04-16T21:02:28.977487Z"}, {"uuid": "9e2ad2c2-b7e4-4118-91c6-052d8154c03b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://t.me/CyberBulletin/2297", "content": "\u26a1CVE-2024-51547 (CVSS 9.8): Hard-Coded Credentials in ABB ASPECT.\n\n#CyberBulletin", "creation_timestamp": "2025-02-12T04:32:04.000000Z"}, {"uuid": "253f49ec-2504-4944-ac2e-9021b0ecbf9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51543", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600428617635495", "content": "", "creation_timestamp": "2024-12-05T13:22:58.894311Z"}, {"uuid": "fa4d82b5-b4da-424f-9be1-9cb38ee6d47e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51544", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113600428634440876", "content": "", "creation_timestamp": "2024-12-05T13:22:58.389910Z"}, {"uuid": "7ee35876-87f0-4704-8016-a7733afb51c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51549", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113624105624570013", "content": "", "creation_timestamp": "2024-12-09T17:44:20.880373Z"}, {"uuid": "cfd36636-8181-4e9d-848a-bc5ebfb0e174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51545", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "a51795d6-70a4-4393-a79e-3989bac94ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51548", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-01", "content": "", "creation_timestamp": "2025-01-07T11:00:00.000000Z"}, {"uuid": "def8a19f-cb82-4d6c-816a-9507783a474f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhinleubby2v", "content": "", "creation_timestamp": "2025-02-06T08:18:23.460906Z"}, {"uuid": "1dddc940-de6c-4e98-b7f5-ec8a9bf901d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113956074810400594", "content": "", "creation_timestamp": "2025-02-06T08:48:28.713444Z"}, {"uuid": "4d707c7e-0bbe-4f6e-8660-55a474e54fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lhjpvbt4kq2w", "content": "", "creation_timestamp": "2025-02-06T18:32:24.910777Z"}, {"uuid": "6d8e5dae-995f-41f8-8c48-e9acfad4ba6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lm5xwjx67r2f", "content": "", "creation_timestamp": "2025-04-06T17:30:18.293074Z"}, {"uuid": "64d3aff1-b7ae-465e-b6f2-14469601dfd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-51547", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lm6vavccoe2z", "content": "", "creation_timestamp": "2025-04-07T02:15:02.516853Z"}]}