PatchSiren cyber security CVE debrief
CVE-2024-7348 ABB CVE debrief
CVE-2024-7348 is a high-severity ABB Ability Symphony Plus S+ Engineering issue that can let an attacker leverage a PostgreSQL utility to execute arbitrary SQL functions. The advisory says affected installations should be upgraded to S+ Engineering 2.4 SP2 RU1 or later, and notes there are no workarounds.
- Vendor
- ABB
- Product
- Ability Symphony Plus
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-13
- Original CVE updated
- 2026-04-30
- Advisory published
- 2026-04-13
- Advisory updated
- 2026-04-30
Who should care
ABB Ability Symphony Plus S+ Engineering administrators, OT/ICS security teams, and operators responsible for affected installations in industrial environments.
Technical summary
CISA’s republished ABB PSIRT advisory describes a PostgreSQL time-of-check time-of-use (TOCTOU) race condition affecting ABB Ability Symphony Plus S+ Engineering versions 2.2 through 2.4 SP2. The issue can allow an attacker to execute arbitrary SQL functions by leveraging a PostgreSQL utility often run with high privileges. The CVSS vector is 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), and the advisory states that exploitation requires access to the site’s S+ client/server network.
Defensive priority
High. Prioritize upgrading affected systems to S+ Engineering 2.4 SP2 RU1 or later, especially where the client/server network is reachable or poorly segmented.
Recommended defensive actions
- Inventory ABB Ability Symphony Plus S+ Engineering deployments and confirm whether any systems are running versions 2.2 through 2.4 SP2.
- Upgrade impacted systems to S+ Engineering 2.4 SP2 RU1 or later at the earliest convenience.
- If immediate upgrade is not possible, apply ABB’s mitigating factors by tightening network architecture and perimeter firewall controls to restrict access to the S+ client/server network.
- Treat this advisory as installation-specific risk guidance because ABB states that no workarounds are available.
- Follow ABB’s general security recommendations and defense-in-depth practices for industrial control systems.
Evidence notes
This debrief is based on the CISA CSAF republished advisory ICSA-26-120-06 / ABB PSIRT advisory 7PAA017341, plus the linked CVE.org and NVD records. The source corpus provides the affected version range, the upgrade target, the no-workaround statement, and the network-access mitigation context. The vendor field in the supplied metadata is low confidence, so the advisory attribution is kept aligned with the source material.
Official resources
-
CVE-2024-7348 CVE record
CVE.org
-
CVE-2024-7348 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory on 2026-04-13 and republished it on 2026-04-30, citing ABB PSIRT advisory 7PAA017341.