Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3465: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ABB CoreSense™ HM

0
High
VulnerabilityCVE-2025-3465cvecve-2025-3465cwe-22
Published: Mon Oct 20 2025 (10/20/2025, 17:52:40 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: CoreSense™ HM

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABB CoreSense™ HM, ABB CoreSense™ M10.This issue affects CoreSense™ HM: through 2.3.1; CoreSense™ M10: through 1.4.1.12.

AI-Powered Analysis

AILast updated: 10/20/2025, 18:01:22 UTC

Technical Analysis

CVE-2025-3465 is a path traversal vulnerability classified under CWE-22, found in ABB CoreSense™ HM and CoreSense™ M10 products. The flaw arises from improper limitation of pathnames to restricted directories, allowing an attacker to craft file paths that escape intended directory boundaries. This can enable unauthorized access to files outside the designated directories, potentially exposing sensitive configuration files, logs, or other critical data. The vulnerability affects CoreSense™ HM versions through 2.3.1 and CoreSense™ M10 versions through 1.4.1.12. The CVSS 4.0 base score is 8.2 (high), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (VC:H) but no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it easier to exploit by any local user or process with access to the system. Although no exploits are currently known in the wild, the potential for sensitive data disclosure is significant. ABB has not yet published patches, so mitigation currently relies on access control and monitoring. This vulnerability is particularly concerning for industrial environments where CoreSense™ products are deployed for monitoring and control, as unauthorized file access could lead to information leakage or aid further attacks.

Potential Impact

The primary impact of CVE-2025-3465 is unauthorized disclosure of sensitive information due to path traversal, which compromises confidentiality. For European organizations, especially those in industrial automation, energy, and manufacturing sectors using ABB CoreSense™ HM or M10 devices, this could expose critical operational data or configuration files. Such exposure may facilitate further attacks, including sabotage or espionage. Since the vulnerability requires local access, insider threats or compromised local accounts pose a significant risk. The lack of impact on integrity and availability reduces the risk of direct operational disruption, but information leakage alone can have severe consequences, including regulatory penalties under GDPR if personal or sensitive data is exposed. The vulnerability's presence in widely used ABB products means that organizations with ABB deployments across Europe must prioritize assessment and mitigation to prevent potential exploitation.

Mitigation Recommendations

1. Immediately restrict local access to ABB CoreSense™ HM and M10 devices to trusted personnel only, using strict access control policies and network segmentation. 2. Monitor and audit local user activities on affected devices to detect any suspicious file access attempts. 3. Implement host-based intrusion detection systems (HIDS) to alert on unusual file system access patterns. 4. Once ABB releases patches or updates addressing CVE-2025-3465, apply them promptly following thorough testing. 5. If patching is delayed, consider deploying compensating controls such as application whitelisting or sandboxing to limit the ability of unauthorized processes to exploit the vulnerability. 6. Review and harden device configurations to minimize unnecessary local services or accounts. 7. Educate local users and administrators about the risks of unauthorized file access and enforce strong authentication mechanisms for device access. 8. Coordinate with ABB support for guidance and updates on vulnerability remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-04-09T10:11:48.997Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f6785707c863f509432ccb

Added to database: 10/20/2025, 5:58:47 PM

Last enriched: 10/20/2025, 6:01:22 PM

Last updated: 10/21/2025, 2:49:54 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats