CVE-2025-3450

10.0 CRITICAL

📋 TL;DR

An unauthenticated network attacker can exploit improper resource locking in B&R Automation Runtime's SDM component to delete data, causing denial of service. This affects B&R Automation Runtime versions before 6.3 and before Q4.93. Industrial control systems using these vulnerable versions are at risk.

💻 Affected Systems

Products:
  • B&R Automation Runtime
Versions: Versions before 6.3 and before Q4.93
Operating Systems: Industrial control system platforms running B&R Automation Runtime
Default Config Vulnerable: ⚠️ Yes
Notes: SDM (System Data Management) component is vulnerable. Industrial control systems in manufacturing, energy, and critical infrastructure sectors are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial processes are disrupted through data deletion, causing extended downtime, production losses, and potential safety incidents.

🟠

Likely Case

Operational disruption through data deletion leading to temporary denial of service in industrial automation systems.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthenticated network access.

🌐 Internet-Facing: HIGH - Unauthenticated network-based exploitation means internet-exposed systems are immediately vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated network access allows exploitation across the network segment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability requires network access but no authentication. Exploitation likely involves sending crafted network packets to trigger the improper resource locking condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 6.3 or Q4.93 and later

Vendor Advisory: https://www.br-automation.com/fileadmin/SA25P002-f6a69e61.pdf

Restart Required: Yes

Instructions:

1. Download the updated Automation Runtime version 6.3 or Q4.93 from B&R support portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate B&R Automation Runtime systems from untrusted networks using firewalls and VLANs.

Access Control Lists

all

Implement strict network access controls to limit connections to B&R systems only from authorized sources.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts and anomalous data deletion patterns

🔍 How to Verify

Check if Vulnerable:

Check Automation Runtime version via system properties or management interface. Versions before 6.3 or Q4.93 are vulnerable.

Check Version:

Check via Automation Runtime management interface or system properties display

Verify Fix Applied:

Verify installed version is 6.3 or Q4.93 or later. Test system functionality and monitor for abnormal data deletion events.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected data deletion events
  • SDM component error messages
  • Unauthenticated network connections to SDM ports

Network Indicators:

  • Unusual traffic patterns to SDM ports (typically TCP/1217)
  • Crafted packets targeting SDM component

SIEM Query:

source_ip=* AND dest_port=1217 AND protocol=TCP AND (payload_contains="SDM" OR abnormal_packet_size)

🔗 References

📤 Share & Export