Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13777: CWE-294 Authentication bypass by capture-replay in ABB AWIN GW100 rev.2

0
High
VulnerabilityCVE-2025-13777cvecve-2025-13777cwe-294
Published: Fri Mar 13 2026 (03/13/2026, 13:05:26 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: AWIN GW100 rev.2

Description

Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

AI-Powered Analysis

AILast updated: 03/13/2026, 13:29:05 UTC

Technical Analysis

CVE-2025-13777 is a vulnerability classified under CWE-294 (Authentication Bypass) affecting ABB AWIN GW100 rev.2 and AWIN GW120 devices. The flaw allows an attacker to bypass authentication by performing a capture-replay attack on the authentication mechanism. Specifically, an attacker can capture valid authentication data transmitted over the network and replay it to gain unauthorized access to the device without needing valid credentials or user interaction. The affected firmware versions are 2.0-0 and 2.0-1 for AWIN GW100 rev.2, and 1.2-0 and 1.2-1 for AWIN GW120. The vulnerability is remotely exploitable (Attack Vector: Adjacent Network), requires no privileges or user interaction, and has low attack complexity. The impact is high on confidentiality (full unauthorized access), low on integrity (some controls may remain intact), and high on availability (potential for service disruption). These ABB devices are typically used in industrial control systems and critical infrastructure environments, making this vulnerability particularly concerning. No patches or official fixes have been published yet, and no known exploits have been observed in the wild as of the publication date. The vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery and disclosure.

Potential Impact

The vulnerability allows attackers to bypass authentication controls on ABB AWIN GW100 rev.2 and AWIN GW120 devices, potentially granting unauthorized access to critical industrial control systems. This can lead to unauthorized disclosure of sensitive operational data (high confidentiality impact), unauthorized commands or configuration changes (partial integrity impact), and disruption or denial of service of critical infrastructure components (high availability impact). Given these devices' role in industrial environments, exploitation could result in operational downtime, safety risks, and financial losses. The ease of exploitation without credentials or user interaction increases the threat level, especially in environments where these devices are accessible over adjacent networks. The absence of known exploits in the wild reduces immediate risk but does not diminish the potential for future attacks. Organizations relying on these ABB devices in sectors such as energy, manufacturing, and utilities face significant operational and security risks if this vulnerability is exploited.

Mitigation Recommendations

1. Implement strict network segmentation to isolate ABB AWIN GW100 rev.2 and AWIN GW120 devices from general network access, limiting exposure to adjacent network attackers. 2. Employ robust network monitoring and intrusion detection systems to detect replay attacks or anomalous authentication attempts targeting these devices. 3. Restrict physical and logical access to the devices to trusted personnel and systems only. 4. Use VPNs or encrypted tunnels for remote access to reduce the risk of capture-replay attacks on authentication data. 5. Regularly audit device firmware versions and configurations to identify and track vulnerable devices. 6. Engage with ABB support channels to obtain updates or patches as they become available and apply them promptly. 7. Consider deploying additional authentication layers or compensating controls such as multi-factor authentication if supported by the environment. 8. Conduct security awareness training for operational technology (OT) staff to recognize and respond to potential exploitation attempts. 9. Develop and test incident response plans specific to industrial control system compromises involving these devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-11-28T14:22:32.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b40df72f860ef943ddd9e9

Added to database: 3/13/2026, 1:15:35 PM

Last enriched: 3/13/2026, 1:29:05 PM

Last updated: 3/13/2026, 4:51:17 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses