Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4675: CWE-754 Improper Check for Unusual or Exceptional Conditions in ABB WebPro SNMP Card PowerValue

0
Medium
VulnerabilityCVE-2025-4675cvecve-2025-4675cwe-754
Published: Wed Jan 07 2026 (01/07/2026, 16:55:43 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: WebPro SNMP Card PowerValue

Description

Improper Check for Unusual or Exceptional Conditions vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

AI-Powered Analysis

AILast updated: 01/07/2026, 17:27:57 UTC

Technical Analysis

CVE-2025-4675 identifies a vulnerability in ABB's WebPro SNMP Card PowerValue and PowerValue UL devices, specifically versions through 1.1.8.K. The root cause is an improper check for unusual or exceptional conditions (CWE-754), which means the device firmware or software fails to correctly handle unexpected input or states. This flaw can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:A/AC:L/PR:N/UI:N). The primary impact is on availability (A:H), suggesting that an attacker can cause a denial of service, potentially by triggering a fault or crash in the SNMP card's operation. The vulnerability does not affect confidentiality or integrity, so data leakage or unauthorized modification is not a concern here. The affected product is used in industrial control and monitoring environments, where SNMP cards provide network management capabilities. Although no exploits are known in the wild and no patches have been released yet, the vulnerability's presence in critical infrastructure components necessitates proactive risk management. The improper condition checks could lead to device instability or failure, disrupting monitoring and control functions essential for operational continuity.

Potential Impact

For European organizations, especially those in industrial automation, energy, and critical infrastructure sectors, this vulnerability poses a risk of denial of service on ABB WebPro SNMP Card PowerValue devices. Disruption of SNMP monitoring can impair network management and fault detection, potentially leading to delayed responses to operational issues or outages. In environments where these devices are integrated into supervisory control and data acquisition (SCADA) systems or other industrial control systems (ICS), availability interruptions can have cascading effects on production lines, energy distribution, or safety systems. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can cause significant operational and financial impacts. The lack of authentication requirements and user interaction for exploitation increases the risk, especially if the devices are accessible over less secure or segmented networks. European organizations relying on ABB's products should consider this vulnerability a moderate threat to operational stability.

Mitigation Recommendations

1. Immediately restrict network access to ABB WebPro SNMP Card PowerValue devices by implementing strict firewall rules and network segmentation, limiting SNMP traffic to trusted management stations only. 2. Monitor device logs and network traffic for unusual SNMP requests or signs of instability that could indicate exploitation attempts. 3. Engage with ABB support channels to obtain information on planned patches or firmware updates addressing CVE-2025-4675 and apply them promptly once available. 4. Implement redundancy and failover mechanisms for critical SNMP monitoring infrastructure to minimize operational impact in case of device failure. 5. Conduct regular vulnerability assessments and penetration testing focused on industrial control devices to identify and remediate similar weaknesses. 6. Educate operational technology (OT) and IT teams about the vulnerability and ensure coordinated incident response plans are in place for potential denial of service events. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous SNMP traffic patterns targeting these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-05-14T06:02:12.696Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e93fd7349d0379db278a0

Added to database: 1/7/2026, 5:12:29 PM

Last enriched: 1/7/2026, 5:27:57 PM

Last updated: 1/9/2026, 2:07:11 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats