ABB Edgenius Management Portal

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications.

The following versions of ABB Edgenius Management Portal are affected:

  • Edgenius Management Portal 3.2.0.0|3.2.1.1
CVSS Vendor Equipment Vulnerabilities
v3 9.6 ABB ABB Edgenius Management Portal Authentication Bypass Using an Alternate Path or Channel

Background

  • Critical Infrastructure Sectors: Critical Manufacturing, Information Technology
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Switzerland

Vulnerabilities

Expand All +

CVE-2025-10571

The Edgenius Management Portal in the affected product versions contains a vulnerability that allows authentication to be bypassed. An attacker could exploit the vulnerability by sending a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall in-stalled applications and modify the configuration of installed applications.

View CVE Details


Affected Products

ABB Edgenius Management Portal
Vendor:
ABB
Product Version:
ABB Edgenius Management Portal: 3.2.0.0|3.2.1.1
Product Status:
known_affected
Remediations

Vendor fix
ABB has prepared an update to fix this vulnerability included in the latest Roll-Up, ABB Ability Edgenius version 3.2.2.0. ABB advises customers to upgrade as soon as possible. Until the upgrade is applied, ABB advises customers to disable the Edgenius Management Portal to mitigate the vulnerability.

Vendor fix
All affected products: Exploitation requires an attacker to have gained access to the network where Edgenius has been deployed, and while the Edgenius Management Portal is running. Refer to section “General security recommendations” for further advise on how to keep your system secure.

Mitigation
All affected products: Workarounds are specific measures that a user can take to help block an attack, for example, temporarily disabling the vulnerable feature may remove the exposure with well-known impact on functionality. ABB has tested the following workaround.

Mitigation
The following product versions have been fixed:
Ability Edgenius 3.2.2.0 is a fixed version for CVE-2025-10571

Mitigation
For more information see the associated ABB PSIRT security advisory 7PAA022088 ABB CYBERSECURITY ADVISORY – PDF version (https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch), ABB CYBERSECURITY ADVISORY – CSAF version (https://psirt.abb.com/csaf/2025/7paa022088.json).
https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch

Mitigation
For more information see the associated ABB PSIRT security advisory 7PAA022088 ABB CYBERSECURITY ADVISORY – PDF version (https://search.abb.com/library/Download.aspx?DocumentID=7PAA022088&LanguageCode=en&DocumentPartId=&Action=Launch), ABB CYBERSECURITY ADVISORY – CSAF version (https://psirt.abb.com/csaf/2025/7paa022088.json).
https://psirt.abb.com/csaf/2025/7paa022088.json

Relevant CWE: CWE-288 Authentication Bypass Using an Alternate Path or Channel


Metrics

C

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: