CVE-2025-3465: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABB CoreSense™ HM
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABB CoreSense™ HM, ABB CoreSense™ M10.This issue affects CoreSense™ HM: through 2.3.1; CoreSense™ M10: through 1.4.1.12.
AI Analysis
Technical Summary
CVE-2025-3465 is a path traversal vulnerability classified under CWE-22, found in ABB CoreSense™ HM and CoreSense™ M10 products. The flaw arises from improper limitation of pathnames to restricted directories, allowing an attacker to craft file paths that escape intended directory boundaries. This can enable unauthorized access to files outside the designated directories, potentially exposing sensitive configuration files, logs, or other critical data. The vulnerability affects CoreSense™ HM versions through 2.3.1 and CoreSense™ M10 versions through 1.4.1.12. The CVSS 4.0 base score is 8.2 (high), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) but no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit by any local user or process with access to the system. Although no exploits are currently known in the wild, the potential for sensitive data disclosure is significant. ABB has not yet published patches, so mitigation currently relies on access control and monitoring. This vulnerability is particularly concerning for industrial environments where CoreSense™ products are deployed for monitoring and control, as unauthorized file access could lead to information leakage or aid further attacks.
Potential Impact
The primary impact of CVE-2025-3465 is unauthorized disclosure of sensitive information due to path traversal, which compromises confidentiality. For European organizations, especially those in industrial automation, energy, and manufacturing sectors using ABB CoreSense™ HM or M10 devices, this could expose critical operational data or configuration files. Such exposure may facilitate further attacks, including sabotage or espionage. Since the vulnerability requires local access, insider threats or compromised local accounts pose a significant risk. The lack of impact on integrity and availability reduces the risk of direct operational disruption, but information leakage alone can have severe consequences, including regulatory penalties under GDPR if personal or sensitive data is exposed. The vulnerability's presence in widely used ABB products means that organizations with ABB deployments across Europe must prioritize assessment and mitigation to prevent potential exploitation.
Mitigation Recommendations
1. Immediately restrict local access to ABB CoreSense™ HM and M10 devices to trusted personnel only, using strict access control policies and network segmentation. 2. Monitor and audit local user activities on affected devices to detect any suspicious file access attempts. 3. Implement host-based intrusion detection systems (HIDS) to alert on unusual file system access patterns. 4. Once ABB releases patches or updates addressing CVE-2025-3465, apply them promptly following thorough testing. 5. If patching is delayed, consider deploying compensating controls such as application whitelisting or sandboxing to limit the ability of unauthorized processes to exploit the vulnerability. 6. Review and harden device configurations to minimize unnecessary local services or accounts. 7. Educate local users and administrators about the risks of unauthorized file access and enforce strong authentication mechanisms for device access. 8. Coordinate with ABB support for guidance and updates on vulnerability remediation.
Affected Countries
Germany, Sweden, Switzerland, France, Italy, United Kingdom, Netherlands
CVE-2025-3465: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABB CoreSense™ HM
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABB CoreSense™ HM, ABB CoreSense™ M10.This issue affects CoreSense™ HM: through 2.3.1; CoreSense™ M10: through 1.4.1.12.
AI-Powered Analysis
Technical Analysis
CVE-2025-3465 is a path traversal vulnerability classified under CWE-22, found in ABB CoreSense™ HM and CoreSense™ M10 products. The flaw arises from improper limitation of pathnames to restricted directories, allowing an attacker to craft file paths that escape intended directory boundaries. This can enable unauthorized access to files outside the designated directories, potentially exposing sensitive configuration files, logs, or other critical data. The vulnerability affects CoreSense™ HM versions through 2.3.1 and CoreSense™ M10 versions through 1.4.1.12. The CVSS 4.0 base score is 8.2 (high), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) but no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit by any local user or process with access to the system. Although no exploits are currently known in the wild, the potential for sensitive data disclosure is significant. ABB has not yet published patches, so mitigation currently relies on access control and monitoring. This vulnerability is particularly concerning for industrial environments where CoreSense™ products are deployed for monitoring and control, as unauthorized file access could lead to information leakage or aid further attacks.
Potential Impact
The primary impact of CVE-2025-3465 is unauthorized disclosure of sensitive information due to path traversal, which compromises confidentiality. For European organizations, especially those in industrial automation, energy, and manufacturing sectors using ABB CoreSense™ HM or M10 devices, this could expose critical operational data or configuration files. Such exposure may facilitate further attacks, including sabotage or espionage. Since the vulnerability requires local access, insider threats or compromised local accounts pose a significant risk. The lack of impact on integrity and availability reduces the risk of direct operational disruption, but information leakage alone can have severe consequences, including regulatory penalties under GDPR if personal or sensitive data is exposed. The vulnerability's presence in widely used ABB products means that organizations with ABB deployments across Europe must prioritize assessment and mitigation to prevent potential exploitation.
Mitigation Recommendations
1. Immediately restrict local access to ABB CoreSense™ HM and M10 devices to trusted personnel only, using strict access control policies and network segmentation. 2. Monitor and audit local user activities on affected devices to detect any suspicious file access attempts. 3. Implement host-based intrusion detection systems (HIDS) to alert on unusual file system access patterns. 4. Once ABB releases patches or updates addressing CVE-2025-3465, apply them promptly following thorough testing. 5. If patching is delayed, consider deploying compensating controls such as application whitelisting or sandboxing to limit the ability of unauthorized processes to exploit the vulnerability. 6. Review and harden device configurations to minimize unnecessary local services or accounts. 7. Educate local users and administrators about the risks of unauthorized file access and enforce strong authentication mechanisms for device access. 8. Coordinate with ABB support for guidance and updates on vulnerability remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-04-09T10:11:48.997Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f6785707c863f509432ccb
Added to database: 10/20/2025, 5:58:47 PM
Last enriched: 10/20/2025, 6:01:22 PM
Last updated: 10/21/2025, 2:49:54 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9133: CWE-862 Missing Authorization in Zyxel ATP series firmware
HighCVE-2025-8078: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2025-7851: Vulnerability in TP-Link Systems Inc. Omada gateways
HighCVE-2025-7850: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Omada gateways
CriticalCVE-2025-6542: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Omada gateways
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.