CVE-2025-7745: CWE-126: Buffer Over-read in ABB AC500 V2
Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2.
AI Analysis
Technical Summary
CVE-2025-7745 is a medium-severity buffer over-read vulnerability identified in ABB's AC500 V2 programmable logic controller (PLC) product line, affecting versions up to 2.5.2. The vulnerability is classified under CWE-126, which involves reading data beyond the intended buffer boundaries. This flaw can occur when the software attempts to read more data than allocated in a buffer, potentially exposing sensitive information or causing unexpected behavior. The CVSS 3.1 base score is 5.8, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it remotely exploitable by an unauthenticated attacker over the network. However, no known exploits are currently reported in the wild, and no patches have been linked yet. Given the nature of buffer over-read, attackers might be able to read sensitive memory contents, which could include configuration data or other information that might aid further attacks or reconnaissance. The affected product, ABB AC500 V2, is widely used in industrial control systems (ICS) and critical infrastructure automation, making this vulnerability particularly relevant to operational technology (OT) environments.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, water treatment, and transportation, this vulnerability poses a risk of information leakage from industrial control systems. Although the vulnerability does not directly allow for system takeover or disruption, the confidentiality breach could facilitate further targeted attacks by revealing sensitive operational details or credentials. The exposure of such information could undermine the security posture of ICS environments, potentially leading to more severe attacks. Given the increasing integration of ICS with corporate networks and remote access capabilities, the risk of exploitation is amplified. The lack of required privileges and user interaction means attackers can attempt exploitation remotely, increasing the threat surface. European organizations relying on ABB AC500 V2 PLCs should consider this vulnerability seriously, as it could be leveraged in multi-stage attacks against critical infrastructure.
Mitigation Recommendations
1. Immediate network segmentation: Isolate ABB AC500 V2 devices from general IT networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and access control lists (ACLs) to limit network exposure of the affected PLCs, allowing only necessary communication from authorized sources. 3. Monitor network traffic for unusual or unauthorized access attempts targeting ABB AC500 V2 devices, using IDS/IPS systems tuned for ICS protocols. 4. Apply vendor patches promptly once available; coordinate with ABB support channels to obtain updates or workarounds. 5. Conduct regular security audits and vulnerability assessments on ICS environments to identify and remediate similar issues proactively. 6. Employ defense-in-depth strategies such as multi-factor authentication for remote access and robust logging to detect potential exploitation attempts. 7. Train ICS operators and security personnel on recognizing signs of exploitation and maintaining secure configurations of PLC devices.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Sweden, Belgium, Spain, Poland, Czech Republic
CVE-2025-7745: CWE-126: Buffer Over-read in ABB AC500 V2
Description
Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-7745 is a medium-severity buffer over-read vulnerability identified in ABB's AC500 V2 programmable logic controller (PLC) product line, affecting versions up to 2.5.2. The vulnerability is classified under CWE-126, which involves reading data beyond the intended buffer boundaries. This flaw can occur when the software attempts to read more data than allocated in a buffer, potentially exposing sensitive information or causing unexpected behavior. The CVSS 3.1 base score is 5.8, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The vulnerability does not require authentication or user interaction, making it remotely exploitable by an unauthenticated attacker over the network. However, no known exploits are currently reported in the wild, and no patches have been linked yet. Given the nature of buffer over-read, attackers might be able to read sensitive memory contents, which could include configuration data or other information that might aid further attacks or reconnaissance. The affected product, ABB AC500 V2, is widely used in industrial control systems (ICS) and critical infrastructure automation, making this vulnerability particularly relevant to operational technology (OT) environments.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, water treatment, and transportation, this vulnerability poses a risk of information leakage from industrial control systems. Although the vulnerability does not directly allow for system takeover or disruption, the confidentiality breach could facilitate further targeted attacks by revealing sensitive operational details or credentials. The exposure of such information could undermine the security posture of ICS environments, potentially leading to more severe attacks. Given the increasing integration of ICS with corporate networks and remote access capabilities, the risk of exploitation is amplified. The lack of required privileges and user interaction means attackers can attempt exploitation remotely, increasing the threat surface. European organizations relying on ABB AC500 V2 PLCs should consider this vulnerability seriously, as it could be leveraged in multi-stage attacks against critical infrastructure.
Mitigation Recommendations
1. Immediate network segmentation: Isolate ABB AC500 V2 devices from general IT networks and restrict access to trusted management networks only. 2. Implement strict firewall rules and access control lists (ACLs) to limit network exposure of the affected PLCs, allowing only necessary communication from authorized sources. 3. Monitor network traffic for unusual or unauthorized access attempts targeting ABB AC500 V2 devices, using IDS/IPS systems tuned for ICS protocols. 4. Apply vendor patches promptly once available; coordinate with ABB support channels to obtain updates or workarounds. 5. Conduct regular security audits and vulnerability assessments on ICS environments to identify and remediate similar issues proactively. 6. Employ defense-in-depth strategies such as multi-factor authentication for remote access and robust logging to detect potential exploitation attempts. 7. Train ICS operators and security personnel on recognizing signs of exploitation and maintaining secure configurations of PLC devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-07-17T08:40:39.666Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6881e19dad5a09ad003124d0
Added to database: 7/24/2025, 7:32:45 AM
Last enriched: 7/24/2025, 7:47:55 AM
Last updated: 10/30/2025, 11:12:17 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
Critical136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
MediumCVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest
HighCVE-2025-54941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Apache Software Foundation Apache Airflow
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.