Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3449: CWE-340 Generation of Predictable Numbers or Identifiers in B&R Industrial Automation Automation Runtime

0
Low
VulnerabilityCVE-2025-3449cvecve-2025-3449cwe-340
Published: Tue Oct 07 2025 (10/07/2025, 18:21:32 UTC)
Source: CVE Database V5
Vendor/Project: B&R Industrial Automation
Product: Automation Runtime

Description

Generation of Predictable Numbers or Identifiers vulnerability in B&R Industrial Automation Automation Runtime.This issue affects Automation Runtime: from 6.0 before 6.4.

AI-Powered Analysis

AILast updated: 10/07/2025, 18:45:58 UTC

Technical Analysis

CVE-2025-3449 identifies a vulnerability in B&R Industrial Automation's Automation Runtime software, specifically versions from 6.0 up to but not including 6.4. The issue is classified under CWE-340, which concerns the generation of predictable numbers or identifiers. In this context, the software produces values that are supposed to be random or unique but are instead predictable, potentially allowing attackers to guess or reproduce these values. Such predictable identifiers can undermine security controls that depend on randomness, such as session tokens, cryptographic nonces, or unique transaction IDs. The vulnerability is remotely exploitable over the network without requiring privileges, but it does require user interaction, which limits the ease of exploitation. The CVSS 4.0 base score is 2.3, reflecting a low severity due to limited confidentiality and integrity impact, no availability impact, and no scope change. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability affects industrial automation environments where Automation Runtime is deployed, potentially exposing predictable identifiers that could be leveraged in multi-stage attacks or to bypass certain security checks. Given the critical nature of industrial control systems, even low-severity vulnerabilities warrant attention to prevent escalation or chaining with other vulnerabilities.

Potential Impact

For European organizations, particularly those operating industrial control systems using B&R Automation Runtime, this vulnerability could lead to predictable identifiers being exploited to undermine security mechanisms. While the immediate impact is low, predictable identifiers might facilitate replay attacks, session hijacking, or unauthorized access if combined with other vulnerabilities or misconfigurations. This could affect operational integrity and potentially lead to safety risks or production downtime in critical infrastructure sectors such as manufacturing, energy, and transportation. The low CVSS score and lack of known exploits suggest limited immediate threat, but the industrial automation sector's criticality in Europe means even minor vulnerabilities require attention. Organizations relying on affected versions should consider the risk in the context of their overall security posture and the potential for attackers to chain this issue with other weaknesses.

Mitigation Recommendations

1. Monitor B&R Industrial Automation advisories for official patches addressing CVE-2025-3449 and apply updates promptly once available. 2. Where immediate patching is not possible, implement compensating controls such as network segmentation to isolate Automation Runtime systems from untrusted networks. 3. Limit user interaction requirements by educating users and restricting access to interfaces that might trigger exploitation. 4. Review and enhance logging and monitoring around Automation Runtime components to detect anomalous activities that could indicate exploitation attempts. 5. Evaluate the use of additional randomness or entropy sources in custom configurations or applications interfacing with Automation Runtime to reduce reliance on potentially predictable identifiers. 6. Conduct regular security assessments and penetration testing focusing on industrial control systems to identify and remediate chained vulnerabilities. 7. Collaborate with industrial cybersecurity specialists to tailor defenses specific to the operational environment and threat landscape.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-04-08T14:10:00.516Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e55c41a677756fc99bb4b4

Added to database: 10/7/2025, 6:30:25 PM

Last enriched: 10/7/2025, 6:45:58 PM

Last updated: 10/8/2025, 1:20:18 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats