Summary
Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications.
The following versions of ABB Edgenius Management Portal are affected:
- Edgenius Management Portal 3.2.0.0|3.2.1.1
| CVSS | Vendor | Equipment | Vulnerabilities |
|---|---|---|---|
| v3 9.6 | ABB | ABB Edgenius Management Portal | Authentication Bypass Using an Alternate Path or Channel |
Background
- Critical Infrastructure Sectors: Critical Manufacturing, Information Technology
- Countries/Areas Deployed: Worldwide
- Company Headquarters Location: Switzerland
Vulnerabilities
CVE-2025-10571
The Edgenius Management Portal in the affected product versions contains a vulnerability that allows authentication to be bypassed. An attacker could exploit the vulnerability by sending a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall in-stalled applications and modify the configuration of installed applications.
Affected Products
ABB Edgenius Management Portal
ABB
ABB Edgenius Management Portal: 3.2.0.0|3.2.1.1
known_affected
Remediations
Vendor fix
ABB has prepared an update to fix this vulnerability included in the latest Roll-Up, ABB Ability Edgenius version 3.2.2.0. ABB advises customers to upgrade as soon as possible. Until the upgrade is applied, ABB advises customers to disable the Edgenius Management Portal to mitigate the vulnerability.
Vendor fix
All affected products: Exploitation requires an attacker to have gained access to the network where Edgenius has been deployed, and while the Edgenius Management Portal is running. Refer to section “General security recommendations” for further advise on how to keep your system secure.
Mitigation
All affected products: Workarounds are specific measures that a user can take to help block an attack, for example, temporarily disabling the vulnerable feature may remove the exposure with well-known impact on functionality. ABB has tested the following workaround.
Mitigation
The following product versions have been fixed:
Ability Edgenius 3.2.2.0 is a fixed version for CVE-2025-10571
Mitigation
For more information see the associated ABB PSIRT security advisory 7PAA022088 ABB CYBERSECURITY ADVISORY – PDF version (https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch), ABB CYBERSECURITY ADVISORY – CSAF version (https://psirt.abb.com/csaf/2025/7paa022088.json).
https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch
Mitigation
For more information see the associated ABB PSIRT security advisory 7PAA022088 ABB CYBERSECURITY ADVISORY – PDF version (https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch), ABB CYBERSECURITY ADVISORY – CSAF version (https://psirt.abb.com/csaf/2025/7paa022088.json).
https://psirt.abb.com/csaf/2025/7paa022088.json
Relevant CWE: CWE-288 Authentication Bypass Using an Alternate Path or Channel
Metrics
| C […] Content was cut in order to protect the source.Please visit the source for the rest of the article. This article has been indexed from All CISA Advisories
Read the original article: |
|---|