Skip to main content

CVE-2025-6073: CWE-121 Stack-based Buffer Overflow in ABB RMC-100

High
VulnerabilityCVE-2025-6073cvecve-2025-6073cwe-121
Published: Thu Jul 03 2025 (07/03/2025, 16:49:24 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: RMC-100

Description

Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to the control network, and user/password broker authentication is enabled, and CVE-2025-6074 is exploited, the attacker can overflow the buffer for username or password. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

AI-Powered Analysis

AILast updated: 07/03/2025, 17:09:33 UTC

Technical Analysis

CVE-2025-6073 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting ABB's RMC-100 and RMC-100 LITE products, specifically versions 2105457-043 through 2105457-045 for RMC-100 and 2106229-015 through 2106229-016 for RMC-100 LITE. The vulnerability arises when the REST interface is enabled by the user, and user/password broker authentication is also enabled. An attacker who has gained access to the control network and has exploited CVE-2025-6074 can trigger a buffer overflow by sending crafted username or password inputs. This overflow can corrupt the stack, potentially leading to arbitrary code execution or denial of service. The vulnerability does not require prior authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. The CVSS 4.0 score is 8.2, reflecting high severity due to the ease of exploitation and the potential for significant impact on confidentiality, integrity, and availability. The lack of known exploits in the wild suggests it is a recently disclosed vulnerability, but the critical nature of the affected systems—industrial control devices—makes it a serious concern for operational technology environments.

Potential Impact

For European organizations, especially those operating in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability poses a significant risk. ABB's RMC-100 series devices are used for remote monitoring and control in industrial automation systems. Exploitation could allow attackers to disrupt industrial processes, cause equipment malfunctions, or gain persistent unauthorized access to control networks. This could lead to operational downtime, safety hazards, data breaches, and financial losses. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. Furthermore, the vulnerability's network-based nature means that attackers who have penetrated the control network perimeter could leverage this flaw to escalate privileges or move laterally within the network.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first ensure that the REST interface is disabled if not explicitly required, reducing the attack surface. Where the REST interface and user/password broker authentication are necessary, strict network segmentation should be enforced to limit access to the control network only to trusted entities. Implementing robust intrusion detection and prevention systems tailored for industrial control networks can help detect anomalous authentication attempts or buffer overflow exploit attempts. Organizations should monitor for updates or patches from ABB and apply them promptly once available. In the interim, applying compensating controls such as strict access control lists (ACLs), multi-factor authentication on management interfaces, and continuous network monitoring is critical. Additionally, conducting regular security assessments and penetration testing focused on industrial control systems can help identify and remediate related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-06-13T14:53:34.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6866b5c76f40f0eb72995da7

Added to database: 7/3/2025, 4:54:31 PM

Last enriched: 7/3/2025, 5:09:33 PM

Last updated: 7/7/2025, 8:57:25 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats