PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-39417 ABB CVE debrief

CVE-2023-39417 affects ABB Ability Symphony Plus S+ Engineering. According to the advisory republished by CISA from ABB PSIRT, if an administrator has installed Extension scripts and specific data is used inside a quoting construct, an attacker with proper PostgreSQL privileges may be able to execute arbitrary code on the system as the administrator. ABB’s recommended fix is to upgrade impacted systems to S+ Engineering 2.4 SP2 RU1 or later. The advisory also notes that network architecture and perimeter firewall controls can help reduce exposure, but no workaround is available.

Vendor
ABB
Product
Ability Symphony Plus
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-13
Original CVE updated
2026-04-30
Advisory published
2026-04-13
Advisory updated
2026-04-30

Who should care

OT/ICS defenders, ABB Ability Symphony Plus operators, S+ Engineering administrators, and teams responsible for PostgreSQL-backed industrial engineering systems should review exposure. Sites running the affected S+ Engineering versions and allowing access to the S+ client/server network should prioritize this advisory.

Technical summary

The vulnerability is described as a code-execution issue that depends on two conditions: administrator-installed Extension scripts and attacker-controlled data being used within a quoting construct. The attacker must already have proper PostgreSQL privileges, and the advisory states that exploitability requires access to the site’s S+ client/server network. CISA republishes ABB PSIRT guidance indicating the affected product range spans S+ Engineering 2.2 through 2.4 SP2, with remediation by upgrading to 2.4 SP2 RU1 or later. No workaround is available.

Defensive priority

High. The CVSS score is 7.5 (HIGH), and the potential impact includes arbitrary code execution as the administrator. Prioritize internet-exposed or broadly reachable OT environments first, then confirm version status and update path for all affected deployments.

Recommended defensive actions

  • Verify whether ABB Ability Symphony Plus S+ Engineering is installed and determine whether any system is running versions 2.2 through 2.4 SP2.
  • Upgrade affected systems to S+ Engineering 2.4 SP2 RU1 or later as recommended by ABB.
  • If immediate upgrading is not possible, apply ABB’s mitigating guidance and restrict access to the S+ client/server network using network architecture and perimeter firewall controls.
  • Review whether administrator-installed Extension scripts are present and limit their use to only what is necessary.
  • Validate PostgreSQL privilege assignments and remove unnecessary privileges from accounts that do not require them.
  • Follow ABB’s general security recommendations for industrial control systems and CISA’s ICS defensive guidance.
  • Treat systems with direct or unnecessary network reachability as higher priority for segmentation and access-control review.

Evidence notes

Source corpus states the advisory title is “ABB Ability Symphony Plus Engineering” and the CISA CSAF item is an initial republication of ABB PSIRT advisory 7PAA017341. The advisory description says that when an administrator has installed Extension scripts and specific data is used inside a quoting construct, an attacker with proper PostgreSQL privileges can execute arbitrary code as the administrator. Remediation text states that systems using S+ Engineering 2.2 through 2.4 SP2 should upgrade to 2.4 SP2 RU1 (re-leased in December 2024) or later, and that no workaround is available. The source also notes that exploitation requires access to the site’s S+ client/server network and that network architecture and perimeter firewall controls are mitigating factors.

Official resources

CVE-2023-39417 was published in the supplied source corpus on 2026-04-13T00:30:00Z and modified on 2026-04-30T06:00:00Z. The same dates apply to the CISA CSAF source item, which identifies the notice as an initial republication of ABB PSIRT