Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10504: CWE-122 Heap-based Buffer Overflow in ABB Terra AC wallbox

0
Medium
VulnerabilityCVE-2025-10504cvecve-2025-10504cwe-122
Published: Mon Sep 29 2025 (09/29/2025, 04:12:18 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: Terra AC wallbox

Description

Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.

AI-Powered Analysis

AILast updated: 10/16/2025, 06:53:19 UTC

Technical Analysis

CVE-2025-10504 is a heap-based buffer overflow vulnerability classified under CWE-122, found in ABB Terra AC wallbox devices up to firmware version 1.8.33. This vulnerability arises from improper handling of heap memory, where an attacker with authenticated, high-privilege remote access can trigger a buffer overflow condition. Such a condition can corrupt adjacent memory, potentially leading to application crashes, denial of service, or manipulation of device behavior compromising integrity. The CVSS 4.0 vector indicates that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no user interaction (UI:N), and no privileges required for attack initiation (PR:H), meaning the attacker must have high privileges but no user interaction is needed. The vulnerability impacts availability and integrity but not confidentiality. No public exploits or patches are currently available, and the vulnerability was published on September 29, 2025. ABB Terra AC wallboxes are widely used in electric vehicle charging infrastructure, making this vulnerability relevant to critical energy and transportation sectors. The lack of known exploits suggests limited current risk, but the potential impact on EV charging availability and device integrity warrants proactive mitigation.

Potential Impact

For European organizations, this vulnerability could disrupt electric vehicle charging infrastructure, leading to denial of service or compromised device integrity. This can affect fleet operations, public charging stations, and private installations, potentially causing operational downtime and financial losses. The integrity impact may allow attackers to manipulate charging parameters or device behavior, risking safety and reliability. Given the increasing reliance on EV infrastructure in Europe, especially in countries pushing for green energy and EV adoption, this vulnerability could have cascading effects on transportation and energy sectors. The requirement for high privileges limits exploitation to insiders or attackers who have already compromised credentials, reducing broad external threat risk but increasing concern for targeted attacks or insider threats. The absence of confidentiality impact reduces risks related to data leakage but does not eliminate operational risks.

Mitigation Recommendations

European organizations should implement strict network segmentation to isolate ABB Terra AC wallboxes from general network access, limiting exposure to high-privilege users only. Employ strong authentication and access controls to prevent unauthorized privilege escalation. Monitor device logs and network traffic for anomalous activity indicative of exploitation attempts. Since no patches are currently available, coordinate with ABB for timely updates and apply firmware upgrades as soon as they are released. Conduct regular security audits and vulnerability assessments on EV charging infrastructure. Implement intrusion detection systems tailored to detect buffer overflow exploitation patterns. Additionally, consider deploying endpoint protection solutions capable of detecting memory corruption attempts. Establish incident response plans specifically addressing EV infrastructure compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-09-16T06:05:51.851Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68db1fa7a473ffe031e278ce

Added to database: 9/30/2025, 12:09:11 AM

Last enriched: 10/16/2025, 6:53:19 AM

Last updated: 11/14/2025, 9:29:46 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats