CVE-2025-6071: CWE-321 Use of Hard-coded Cryptographic Key in ABB RMC-100
Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. An attacker can gain access to salted information to decrypt MQTT information. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.
AI Analysis
Technical Summary
CVE-2025-6071 is a vulnerability identified in ABB's RMC-100 and RMC-100 LITE devices, specifically affecting versions 2105457-043 through 2105457-045 for RMC-100 and 2106229-015 through 2106229-016 for RMC-100 LITE. The vulnerability is classified under CWE-321, which pertains to the use of hard-coded cryptographic keys. In this case, the devices use a hard-coded cryptographic key to protect MQTT (Message Queuing Telemetry Transport) communication data. An attacker who gains access to the salted information can leverage this vulnerability to decrypt MQTT messages, potentially exposing sensitive operational data transmitted between devices or systems. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/AT:P/PR:N/UI:N). The CVSS score of 6.3 (medium severity) reflects the moderate impact and ease of exploitation. The use of hard-coded keys is a critical cryptographic weakness because it undermines the confidentiality of encrypted communications, allowing attackers to bypass encryption protections once the key is discovered or extracted. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to the confidentiality of MQTT communications in affected ABB devices, which are commonly used in industrial control and automation environments.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability could lead to unauthorized disclosure of sensitive operational data transmitted via MQTT protocols. ABB's RMC-100 devices are often deployed in industrial automation and remote monitoring systems, meaning that exploitation could compromise the confidentiality of control commands, sensor data, or system status information. This exposure could facilitate further attacks such as industrial espionage, sabotage, or disruption of operational technology (OT) environments. The integrity and availability of systems are not directly impacted by this vulnerability, but the loss of confidentiality can have cascading effects on operational security and trustworthiness. Given the increasing reliance on IoT and IIoT devices in European industries, the vulnerability could affect supply chain security and compliance with data protection regulations such as GDPR if sensitive personal or operational data is exposed. The medium severity rating suggests a moderate but non-trivial risk that requires timely mitigation to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-6071, European organizations using ABB RMC-100 or RMC-100 LITE devices should: 1) Immediately check with ABB for firmware updates or patches addressing this vulnerability, as no patch links are currently provided but vendors typically release fixes post-disclosure. 2) If patches are unavailable, implement network segmentation to isolate affected devices from untrusted networks and limit MQTT traffic exposure. 3) Employ additional encryption layers or VPN tunnels for MQTT communications to compensate for the weak built-in cryptography. 4) Monitor network traffic for unusual MQTT message patterns or unauthorized access attempts to detect potential exploitation attempts. 5) Review and harden device configurations to disable unnecessary services and enforce strict access controls. 6) Engage with ABB support to confirm device versions and plan for device replacement if no remediation is feasible. 7) Incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness. These steps go beyond generic advice by focusing on compensating controls and vendor engagement specific to the affected industrial devices and communication protocols.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Poland, Spain
CVE-2025-6071: CWE-321 Use of Hard-coded Cryptographic Key in ABB RMC-100
Description
Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. An attacker can gain access to salted information to decrypt MQTT information. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.
AI-Powered Analysis
Technical Analysis
CVE-2025-6071 is a vulnerability identified in ABB's RMC-100 and RMC-100 LITE devices, specifically affecting versions 2105457-043 through 2105457-045 for RMC-100 and 2106229-015 through 2106229-016 for RMC-100 LITE. The vulnerability is classified under CWE-321, which pertains to the use of hard-coded cryptographic keys. In this case, the devices use a hard-coded cryptographic key to protect MQTT (Message Queuing Telemetry Transport) communication data. An attacker who gains access to the salted information can leverage this vulnerability to decrypt MQTT messages, potentially exposing sensitive operational data transmitted between devices or systems. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/AT:P/PR:N/UI:N). The CVSS score of 6.3 (medium severity) reflects the moderate impact and ease of exploitation. The use of hard-coded keys is a critical cryptographic weakness because it undermines the confidentiality of encrypted communications, allowing attackers to bypass encryption protections once the key is discovered or extracted. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to the confidentiality of MQTT communications in affected ABB devices, which are commonly used in industrial control and automation environments.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability could lead to unauthorized disclosure of sensitive operational data transmitted via MQTT protocols. ABB's RMC-100 devices are often deployed in industrial automation and remote monitoring systems, meaning that exploitation could compromise the confidentiality of control commands, sensor data, or system status information. This exposure could facilitate further attacks such as industrial espionage, sabotage, or disruption of operational technology (OT) environments. The integrity and availability of systems are not directly impacted by this vulnerability, but the loss of confidentiality can have cascading effects on operational security and trustworthiness. Given the increasing reliance on IoT and IIoT devices in European industries, the vulnerability could affect supply chain security and compliance with data protection regulations such as GDPR if sensitive personal or operational data is exposed. The medium severity rating suggests a moderate but non-trivial risk that requires timely mitigation to prevent potential exploitation.
Mitigation Recommendations
To mitigate CVE-2025-6071, European organizations using ABB RMC-100 or RMC-100 LITE devices should: 1) Immediately check with ABB for firmware updates or patches addressing this vulnerability, as no patch links are currently provided but vendors typically release fixes post-disclosure. 2) If patches are unavailable, implement network segmentation to isolate affected devices from untrusted networks and limit MQTT traffic exposure. 3) Employ additional encryption layers or VPN tunnels for MQTT communications to compensate for the weak built-in cryptography. 4) Monitor network traffic for unusual MQTT message patterns or unauthorized access attempts to detect potential exploitation attempts. 5) Review and harden device configurations to disable unnecessary services and enforce strict access controls. 6) Engage with ABB support to confirm device versions and plan for device replacement if no remediation is feasible. 7) Incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness. These steps go beyond generic advice by focusing on compensating controls and vendor engagement specific to the affected industrial devices and communication protocols.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-06-13T14:53:29.571Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6866b94b6f40f0eb7299875a
Added to database: 7/3/2025, 5:09:31 PM
Last enriched: 7/3/2025, 5:24:33 PM
Last updated: 7/3/2025, 7:02:05 PM
Views: 3
Related Threats
CVE-2025-5322: CWE-434 Unrestricted Upload of File with Dangerous Type in e4jvikwp VikRentCar Car Rental Management System
HighCVE-2025-53367: CWE-787: Out-of-bounds Write in DjvuNet DjVuLibre
HighCVE-2025-49826: CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in vercel next.js
HighCVE-2025-49005: CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in vercel next.js
LowCVE-2025-52554: CWE-862: Missing Authorization in n8n-io n8n
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.