Skip to main content

CVE-2025-8754: CWE-306 Missing Authentication for Critical Function in ABB ABB AbilityTM zenon

High
VulnerabilityCVE-2025-8754cvecve-2025-8754cwe-306
Published: Wed Aug 13 2025 (08/13/2025, 17:40:34 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: ABB AbilityTM zenon

Description

Missing Authentication for Critical Function vulnerability in ABB ABB AbilityTM zenon.This issue affects ABB AbilityTM zenon: from 7.50 through 14.

AI-Powered Analysis

AILast updated: 08/13/2025, 18:03:31 UTC

Technical Analysis

CVE-2025-8754 is a high-severity vulnerability identified in ABB AbilityTM zenon, a widely used industrial automation and SCADA software platform. The vulnerability is classified under CWE-306, which denotes 'Missing Authentication for Critical Function.' This means that certain critical functions within the affected versions of ABB AbilityTM zenon (from version 7.50 through 14) can be accessed or executed without proper authentication controls. The CVSS v3.1 base score of 7.5 reflects a high impact primarily on availability (A:H), with no impact on confidentiality or integrity, and no privileges or user interaction required for exploitation. The attack vector is network-based (AV:N), and the attack complexity is low (AC:L), indicating that an attacker can remotely trigger the vulnerability without needing special conditions or credentials. This vulnerability could allow an unauthenticated attacker to disrupt industrial processes by invoking critical functions, potentially causing denial of service or operational interruptions. Given that ABB AbilityTM zenon is integral to industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments, exploitation could lead to significant operational downtime and safety risks in industrial settings. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on compensating controls until official fixes are released.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, utilities, and transportation, this vulnerability poses a substantial risk. ABB AbilityTM zenon is commonly deployed in European industrial environments for process automation and control. An attacker exploiting this vulnerability could cause service disruptions, leading to production halts, safety incidents, or cascading failures in interconnected systems. The lack of authentication on critical functions means that attackers could remotely trigger operations that may shut down or destabilize industrial processes without detection. This could result in financial losses, regulatory non-compliance, and damage to reputation. Additionally, disruption in critical infrastructure could have broader societal impacts, including affecting public services and supply chains. The absence of confidentiality and integrity impact reduces the risk of data theft or manipulation but does not diminish the threat to operational continuity and availability.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement the following specific mitigations: 1) Network Segmentation: Isolate ABB AbilityTM zenon systems within secure network zones with strict access controls to limit exposure to untrusted networks. 2) Access Control Enforcement: Employ network-level authentication mechanisms such as VPNs, firewalls, and intrusion prevention systems to restrict access to zenon interfaces only to authorized personnel and systems. 3) Monitoring and Logging: Enhance monitoring of zenon system logs and network traffic for unusual or unauthorized access attempts to critical functions. 4) Application Whitelisting: Where possible, restrict execution of critical functions to known and authorized commands or scripts. 5) Vendor Coordination: Engage with ABB for timely updates and patches, and plan for rapid deployment once available. 6) Incident Response Preparedness: Develop and rehearse response plans for potential availability disruptions affecting industrial control systems. 7) Temporary Workarounds: If feasible, disable or restrict access to the vulnerable critical functions until patches are applied. These measures go beyond generic advice by focusing on network architecture, operational monitoring, and vendor collaboration tailored to industrial environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-08-08T13:25:56.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ccfdaad5a09ad004fb4f4

Added to database: 8/13/2025, 5:48:10 PM

Last enriched: 8/13/2025, 6:03:31 PM

Last updated: 8/18/2025, 1:22:20 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats