CVE-2025-6073: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to the control network, and user/password broker authentication is enabled, and CVE-2025-6074 is exploited, the attacker can overflow the buffer for username or password. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.
AI Analysis
Technical Summary
CVE-2025-6073 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting ABB's RMC-100 and RMC-100 LITE products, specifically versions 2105457-043 through 2105457-045 for RMC-100 and 2106229-015 through 2106229-016 for RMC-100 LITE. The vulnerability arises when the REST interface is enabled by the user, and user/password broker authentication is also enabled. An attacker who has gained access to the control network and has exploited CVE-2025-6074 can trigger a buffer overflow by sending crafted username or password inputs. This overflow can corrupt the stack, potentially leading to arbitrary code execution or denial of service. The vulnerability does not require prior authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. The CVSS 4.0 score is 8.2, reflecting high severity due to the ease of exploitation and the potential for significant impact on confidentiality, integrity, and availability. The lack of known exploits in the wild suggests it is a recently disclosed vulnerability, but the critical nature of the affected systems—industrial control devices—makes it a serious concern for operational technology environments.
Potential Impact
For European organizations, especially those operating in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability poses a significant risk. ABB's RMC-100 series devices are used for remote monitoring and control in industrial automation systems. Exploitation could allow attackers to disrupt industrial processes, cause equipment malfunctions, or gain persistent unauthorized access to control networks. This could lead to operational downtime, safety hazards, data breaches, and financial losses. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. Furthermore, the vulnerability's network-based nature means that attackers who have penetrated the control network perimeter could leverage this flaw to escalate privileges or move laterally within the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first ensure that the REST interface is disabled if not explicitly required, reducing the attack surface. Where the REST interface and user/password broker authentication are necessary, strict network segmentation should be enforced to limit access to the control network only to trusted entities. Implementing robust intrusion detection and prevention systems tailored for industrial control networks can help detect anomalous authentication attempts or buffer overflow exploit attempts. Organizations should monitor for updates or patches from ABB and apply them promptly once available. In the interim, applying compensating controls such as strict access control lists (ACLs), multi-factor authentication on management interfaces, and continuous network monitoring is critical. Additionally, conducting regular security assessments and penetration testing focused on industrial control systems can help identify and remediate related vulnerabilities.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Spain, Poland, Belgium, Czech Republic
CVE-2025-6073: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
Description
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to the control network, and user/password broker authentication is enabled, and CVE-2025-6074 is exploited, the attacker can overflow the buffer for username or password. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.
AI-Powered Analysis
Technical Analysis
CVE-2025-6073 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting ABB's RMC-100 and RMC-100 LITE products, specifically versions 2105457-043 through 2105457-045 for RMC-100 and 2106229-015 through 2106229-016 for RMC-100 LITE. The vulnerability arises when the REST interface is enabled by the user, and user/password broker authentication is also enabled. An attacker who has gained access to the control network and has exploited CVE-2025-6074 can trigger a buffer overflow by sending crafted username or password inputs. This overflow can corrupt the stack, potentially leading to arbitrary code execution or denial of service. The vulnerability does not require prior authentication or user interaction, and the attack vector is network-based, making it remotely exploitable. The CVSS 4.0 score is 8.2, reflecting high severity due to the ease of exploitation and the potential for significant impact on confidentiality, integrity, and availability. The lack of known exploits in the wild suggests it is a recently disclosed vulnerability, but the critical nature of the affected systems—industrial control devices—makes it a serious concern for operational technology environments.
Potential Impact
For European organizations, especially those operating in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability poses a significant risk. ABB's RMC-100 series devices are used for remote monitoring and control in industrial automation systems. Exploitation could allow attackers to disrupt industrial processes, cause equipment malfunctions, or gain persistent unauthorized access to control networks. This could lead to operational downtime, safety hazards, data breaches, and financial losses. Given the critical role of industrial control systems in European economies and infrastructure, successful exploitation could have cascading effects on supply chains and public safety. Furthermore, the vulnerability's network-based nature means that attackers who have penetrated the control network perimeter could leverage this flaw to escalate privileges or move laterally within the network.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first ensure that the REST interface is disabled if not explicitly required, reducing the attack surface. Where the REST interface and user/password broker authentication are necessary, strict network segmentation should be enforced to limit access to the control network only to trusted entities. Implementing robust intrusion detection and prevention systems tailored for industrial control networks can help detect anomalous authentication attempts or buffer overflow exploit attempts. Organizations should monitor for updates or patches from ABB and apply them promptly once available. In the interim, applying compensating controls such as strict access control lists (ACLs), multi-factor authentication on management interfaces, and continuous network monitoring is critical. Additionally, conducting regular security assessments and penetration testing focused on industrial control systems can help identify and remediate related vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-06-13T14:53:34.829Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6866b5c76f40f0eb72995da7
Added to database: 7/3/2025, 4:54:31 PM
Last enriched: 7/3/2025, 5:09:33 PM
Last updated: 7/7/2025, 8:57:25 PM
Views: 14
Related Threats
CVE-2025-7401: CWE-798 Use of Hard-coded Credentials in aa-team Premium Age Verification / Restriction for WordPress
CriticalCVE-2025-7435: Cross Site Scripting in LiveHelperChat lhc-php-resque Extension
MediumCVE-2025-53864: CWE-674 Uncontrolled Recursion in Connect2id Nimbus JOSE+JWT
MediumCVE-2025-7434: Stack-based Buffer Overflow in Tenda FH451
HighCVE-2025-7423: Stack-based Buffer Overflow in Tenda O3V2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.