CVE-2025-3449

4.2 MEDIUM

📋 TL;DR

A predictable session identifier generation vulnerability in B&R Automation Runtime's SDM component allows unauthenticated network attackers to hijack established sessions. This affects B&R Automation Runtime versions before 6.4 used in industrial control systems.

💻 Affected Systems

Products:
  • B&R Automation Runtime
Versions: All versions before 6.4
Operating Systems: B&R Automation Runtime OS
Default Config Vulnerable: ⚠️ Yes
Notes: SDM (Service and Diagnostic Manager) component specifically affected

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized control over industrial automation systems, potentially disrupting operations or manipulating physical processes.

🟠

Likely Case

Session hijacking leading to unauthorized access to automation interfaces and configuration data.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent attacker access to vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires network access to vulnerable systems and ability to predict session identifiers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4 or later

Vendor Advisory: https://www.br-automation.com/fileadmin/SA25P003-178b6a20.pdf

Restart Required: No

Instructions:

1. Download Automation Runtime version 6.4 or later from B&R support portal. 2. Backup current configuration. 3. Install update following vendor documentation. 4. Verify successful installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Automation Runtime systems from untrusted networks

Access Control Lists

all

Restrict network access to Automation Runtime systems to authorized IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Monitor network traffic for unusual session activity and implement session timeout policies

🔍 How to Verify

Check if Vulnerable:

Check Automation Runtime version in system properties or via diagnostic tools

Check Version:

Check system properties or use Automation Studio diagnostic tools

Verify Fix Applied:

Verify version is 6.4 or higher and test session establishment

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed session attempts
  • Session ID collisions
  • Unauthorized access attempts

Network Indicators:

  • Unusual session establishment patterns
  • Predictable session ID sequences in network traffic

SIEM Query:

source="automation_runtime" AND (event_type="session_hijack" OR session_id_pattern="predictable")

🔗 References

📤 Share & Export