CVE-2025-30173

6.7 MEDIUM

📋 TL;DR

This CVE describes a file upload vulnerability in ABB's ASPECT, NEXUS, and MATRIX series products that allows attackers to upload malicious files if they compromise administrator session credentials. The vulnerability affects all versions through 3.08.03 and could lead to remote code execution or system compromise.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXUS Series
  • MATRIX Series
Versions: through 3.08.03
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires compromised administrator session credentials to exploit

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, ransomware deployment, or complete control of affected systems

🟠

Likely Case

Malicious file upload leading to limited code execution, data manipulation, or persistence establishment

🟢

If Mitigated

Contained impact with proper credential protection and file upload restrictions

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credential compromise first

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.08.03

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Download latest version from ABB portal
2. Backup current configuration
3. Install update following vendor documentation
4. Restart affected services
5. Verify functionality

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure web application firewall or server to block suspicious file uploads

Strengthen Credential Security

all

Implement MFA, strong password policies, and session timeout for administrator accounts

🧯 If You Can't Patch

  • Implement strict file upload validation and sanitization
  • Isolate affected systems from critical networks and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check product version in administration interface or about dialog

Check Version:

Check via product administration interface or system information

Verify Fix Applied:

Verify version is greater than 3.08.03 and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads
  • Administrator login from unexpected locations
  • Suspicious file execution

Network Indicators:

  • Unexpected file upload traffic to affected systems
  • Anomalous administrator account activity

SIEM Query:

source="aspect-logs" AND (event="file_upload" AND file_extension IN (exe, dll, php, asp)) OR (event="admin_login" AND location="unusual")

🔗 References

📤 Share & Export