Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4676: CWE-303 Incorrect Implementation of Authentication Algorithm in ABB WebPro SNMP Card PowerValue

0
High
VulnerabilityCVE-2025-4676cvecve-2025-4676cwe-303
Published: Wed Jan 07 2026 (01/07/2026, 17:02:29 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: WebPro SNMP Card PowerValue

Description

Incorrect Implementation of Authentication Algorithm vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

AI-Powered Analysis

AILast updated: 01/07/2026, 17:27:09 UTC

Technical Analysis

CVE-2025-4676 identifies a critical vulnerability in ABB's WebPro SNMP Card PowerValue and PowerValue UL devices, specifically in the authentication algorithm implementation (classified under CWE-303: Incorrect Implementation of Authentication Algorithm). The affected versions include all releases through 1.1.8.K. The vulnerability allows remote attackers to bypass authentication mechanisms due to flaws in how the device validates credentials or authentication tokens. According to the CVSS v3.1 vector (AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H), the attack requires network access adjacent to the vulnerable device (e.g., same local network), has low complexity, requires no privileges, but does require user interaction (likely involving tricking an operator or exploiting a protocol interaction). The scope is changed, indicating that successful exploitation can affect resources beyond the vulnerable component. The impact is severe, compromising confidentiality, integrity, and availability, potentially allowing attackers to gain full control over the device, manipulate SNMP data, disrupt power management functions, or cause denial of service. ABB has reserved the CVE and published details, but no patches or known exploits are currently available. The vulnerability is particularly concerning for industrial and critical infrastructure environments where these devices are deployed for power monitoring and management.

Potential Impact

For European organizations, especially those in industrial automation, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. ABB WebPro SNMP Card PowerValue devices are commonly used for power monitoring and management in industrial settings. Exploitation could lead to unauthorized access to sensitive operational data, manipulation of power management functions, and disruption of critical services. This could result in operational downtime, safety hazards, financial losses, and damage to reputation. The ability to bypass authentication remotely with low complexity increases the likelihood of targeted attacks or lateral movement within networks. Given the interconnected nature of European industrial environments and the emphasis on digitalization, the impact could cascade across supply chains and critical services. The lack of available patches heightens the urgency for interim mitigations to reduce exposure.

Mitigation Recommendations

1. Implement strict network segmentation to isolate ABB WebPro SNMP Card PowerValue devices from general IT networks and restrict access to trusted management stations only. 2. Enforce strong access control policies limiting SNMP traffic to authorized IP addresses and use VPNs or secure tunnels for remote management. 3. Monitor SNMP traffic for anomalous authentication attempts or unusual commands indicative of exploitation attempts. 4. Educate operators and administrators about the risk of social engineering or user interaction that could facilitate exploitation. 5. Maintain an inventory of all affected devices and track firmware versions to prioritize patching once ABB releases updates. 6. Engage with ABB support channels for early access to patches or workarounds. 7. Consider deploying intrusion detection/prevention systems tailored to industrial protocols to detect exploitation attempts. 8. Review and harden device configurations, disabling unnecessary SNMP features or services where possible. 9. Prepare incident response plans specific to industrial control system compromises involving these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-05-14T06:02:14.592Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e93fd7349d0379db27893

Added to database: 1/7/2026, 5:12:29 PM

Last enriched: 1/7/2026, 5:27:09 PM

Last updated: 1/8/2026, 11:20:18 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats