CVE-2022-0902

8.1 HIGH

📋 TL;DR

This CVE combines path traversal and command injection vulnerabilities in ABB flow computer and remote controller products. Attackers can exploit these flaws to execute arbitrary code on affected systems, potentially compromising industrial control systems. Organizations using ABB RMC-100, XIO, XFCG5, XRCG5, uFLOG5, or UDC products are affected.

💻 Affected Systems

Products:
  • RMC-100 (Standard)
  • RMC-100-LITE
  • XIO
  • XFCG5
  • XRCG5
  • uFLOG5
  • UDC
Versions: All versions prior to patched versions
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: These are industrial control system devices used in process automation and flow measurement applications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, potentially disrupting industrial processes, stealing sensitive data, or causing physical damage to equipment.

🟠

Likely Case

Unauthorized access to system files and execution of limited commands, potentially leading to data exfiltration or system manipulation.

🟢

If Mitigated

Limited impact if systems are properly segmented, monitored, and have restricted network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Combination of path traversal and command injection suggests attackers need to chain vulnerabilities, but CVSS 8.1 indicates significant exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to ABB security advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A0927&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB portal. 2. Backup current configuration. 3. Apply firmware update following ABB documentation. 4. Restart device. 5. Verify update successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and internet access

Access Control Restrictions

all

Implement strict network access controls and firewall rules to limit communication to only necessary systems

🧯 If You Can't Patch

  • Implement strict network segmentation and isolate affected devices in dedicated VLANs
  • Deploy intrusion detection systems and monitor for unusual command execution or file access patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against ABB security advisory. Devices running unpatched firmware are vulnerable.

Check Version:

Device-specific command via ABB configuration interface or web interface

Verify Fix Applied:

Verify firmware version matches patched version specified in ABB advisory and test for path traversal/command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Unexpected command execution
  • Access to restricted directories

Network Indicators:

  • Unusual network traffic to/from industrial control devices
  • Attempts to access path traversal patterns

SIEM Query:

source="industrial_device" AND (event="file_access" OR event="command_execution") AND (path="../" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export