Skip to main content

CVE-2025-30172: CWE-94 Improper Control of Generation of Code ('Code Injection') in ABB ASPECT-Enterprise

High
VulnerabilityCVE-2025-30172cvecve-2025-30172cwe-94
Published: Thu May 22 2025 (05/22/2025, 17:43:59 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Remote Code Execution vulnerabilities are present in ASPECT if session administrator credentials become compromised This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:28:02 UTC

Technical Analysis

CVE-2025-30172 is a high-severity remote code execution (RCE) vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects ABB's ASPECT-Enterprise product line, including ASPECT-Enterprise, NEXUS Series, and MATRIX Series versions up to 3.08.03. The flaw arises when session administrator credentials are compromised, allowing an attacker with such credentials to execute arbitrary code remotely on the affected systems. The vulnerability requires high privileges (administrator-level access) and does not require user interaction, but it has a high attack complexity and requires prior authentication. The CVSS 4.0 base score of 8.9 reflects the critical impact on confidentiality, integrity, and availability, with the vulnerability being exploitable over the network. The vulnerability's root cause is improper validation or control over code generation, enabling attackers to inject and execute malicious code within the context of the vulnerable application. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the critical nature of the affected systems and the high privileges required. ABB has not yet published patches, so mitigation currently relies on credential protection and access controls.

Potential Impact

For European organizations, the impact of CVE-2025-30172 could be severe, especially for those in critical infrastructure sectors such as energy, manufacturing, and utilities where ABB's ASPECT-Enterprise systems are commonly deployed. Successful exploitation could lead to full system compromise, allowing attackers to disrupt industrial processes, steal sensitive operational data, or cause physical damage through manipulation of control systems. The compromise of confidentiality, integrity, and availability could result in operational downtime, financial losses, regulatory penalties under frameworks like GDPR, and damage to organizational reputation. Given the high privileges required, the threat is particularly concerning if internal credential theft or insider threats are present. The lack of user interaction needed means that once credentials are compromised, exploitation can be automated and stealthy, increasing the risk of persistent and damaging attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately enforce strict credential management policies, including multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. Network segmentation should be implemented to isolate ASPECT-Enterprise systems from less trusted networks and limit lateral movement. Monitoring and logging of administrator sessions should be enhanced to detect anomalous activities indicative of credential misuse. Organizations should apply the principle of least privilege, ensuring that only necessary personnel have administrator access. Until ABB releases official patches, organizations can consider deploying application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect suspicious code injection patterns. Regularly updating and auditing all related systems and conducting penetration testing focused on credential security and code injection vectors will further reduce risk. Finally, organizations should prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-03-17T13:06:41.480Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f64490acd01a2492644b4

Added to database: 5/22/2025, 5:52:09 PM

Last enriched: 7/8/2025, 8:28:02 AM

Last updated: 8/11/2025, 8:03:20 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats