Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9574: CWE-306 Missing Authentication for Critical Function in ABB ALS-mini-s4 IP

0
Critical
VulnerabilityCVE-2025-9574cvecve-2025-9574cwe-306
Published: Mon Oct 20 2025 (10/20/2025, 16:56:32 UTC)
Source: CVE Database V5
Vendor/Project: ABB
Product: ALS-mini-s4 IP

Description

Missing Authentication for Critical Function vulnerability in ABB ALS-mini-s4 IP, ABB ALS-mini-s8 IP.This issue affects .  All firmware versions with the Serial Number from 2000 to 5166

AI-Powered Analysis

AILast updated: 10/28/2025, 04:28:31 UTC

Technical Analysis

CVE-2025-9574 identifies a critical security vulnerability in ABB's ALS-mini-s4 IP and ALS-mini-s8 IP devices, specifically affecting firmware versions with serial numbers ranging from 2000 to 5166. The vulnerability is classified under CWE-306, indicating a missing authentication for a critical function. This means that certain sensitive operations on these devices can be performed without any authentication, allowing an unauthenticated attacker to remotely invoke critical functions. The CVSS 4.0 base score of 9.9 reflects the severity: the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact on confidentiality (C), integrity (I), and availability (A) is high, with potential for complete compromise of device functions. The vulnerability affects industrial control devices used in automation and critical infrastructure, which are often integrated into larger operational technology (OT) environments. No patches or firmware updates have been released yet, and no exploits have been publicly observed, but the ease of exploitation and critical impact make this a high-priority issue. The lack of authentication could allow attackers to manipulate device settings, disrupt industrial processes, or gain footholds for further network intrusion. Given ABB's significant market share in industrial automation, this vulnerability poses a substantial risk to organizations relying on these devices for operational continuity and safety.

Potential Impact

For European organizations, the impact of CVE-2025-9574 is severe. ABB's ALS-mini series devices are commonly deployed in industrial automation, manufacturing plants, energy distribution, and critical infrastructure sectors. Exploitation could lead to unauthorized control over critical functions, causing operational disruptions, safety hazards, and potential physical damage. Confidentiality breaches could expose sensitive operational data, while integrity violations might result in manipulated process controls or false data injection. Availability could be compromised if attackers disrupt device functionality, leading to downtime and financial losses. The lack of authentication means attackers can exploit the vulnerability remotely without credentials, increasing the attack surface. European industries with high automation levels, such as automotive manufacturing in Germany, energy grids in France, and process industries in Italy, are particularly vulnerable. Additionally, critical infrastructure operators and utilities using ABB devices face risks of sabotage or espionage. The potential cascading effects on supply chains and public safety elevate the threat's significance within Europe.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate ABB ALS-mini devices from general IT networks and restrict access to trusted management stations only. 2. Deploy strict firewall rules and access control lists (ACLs) to limit inbound traffic to these devices, allowing only necessary protocols and known IP addresses. 3. Monitor network traffic for unusual or unauthorized access attempts targeting these devices, using intrusion detection/prevention systems (IDS/IPS) tailored for industrial protocols. 4. Engage with ABB support and regularly check for firmware updates or security advisories addressing this vulnerability; prioritize patching as soon as a fix is available. 5. Where possible, disable or restrict access to vulnerable functions until patches are applied. 6. Conduct thorough asset inventories to identify all affected devices by serial number and firmware version. 7. Train operational technology (OT) personnel on recognizing signs of exploitation and enforcing secure device management practices. 8. Consider deploying compensating controls such as VPNs with strong authentication for remote access to these devices. 9. Collaborate with national cybersecurity agencies and industry groups to share threat intelligence and best practices related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-08-28T10:04:01.947Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f66ab8b4f32a3742401d60

Added to database: 10/20/2025, 5:00:40 PM

Last enriched: 10/28/2025, 4:28:31 AM

Last updated: 12/4/2025, 9:51:07 PM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats