CVE-2025-3465

7.1 HIGH

πŸ“‹ TL;DR

This path traversal vulnerability in ABB CoreSense HM and M10 devices allows attackers to access files outside the intended directory. It affects CoreSense HM versions through 2.3.1 and CoreSense M10 versions through 1.4.1.12. Attackers could potentially read sensitive system files or configuration data.

πŸ’» Affected Systems

Products:
  • ABB CoreSenseβ„’ HM
  • ABB CoreSenseβ„’ M10
Versions: CoreSense HM: through 2.3.1; CoreSense M10: through 1.4.1.12
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: These are industrial control system devices used in critical infrastructure environments

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

πŸ”’ Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or system files leading to further attacks

🟠

Likely Case

Information disclosure of configuration files, potentially exposing network details or device credentials

🟒

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access

🌐 Internet-Facing: HIGH - Industrial control systems exposed to internet are prime targets for reconnaissance and initial access
🏒 Internal Only: MEDIUM - Internal attackers could still exploit this for lateral movement or information gathering

🎯 Exploit Status

Public PoC: βœ… No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: CoreSense HM: above 2.3.1; CoreSense M10: above 1.4.1.12

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=3KXG200000R4801&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download latest firmware from ABB portal. 2. Backup current configuration. 3. Apply firmware update following ABB documentation. 4. Verify update completed successfully. 5. Restore configuration if needed.

πŸ”§ Temporary Workarounds

Network Segmentation

all

Isolate CoreSense devices from untrusted networks and internet

Access Control Lists

all

Implement strict firewall rules limiting access to CoreSense devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Deploy web application firewall with path traversal protection rules

πŸ” How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI against affected versions

Check Version:

Check via device web interface or consult ABB documentation for version query commands

Verify Fix Applied:

Verify firmware version is above affected ranges: HM > 2.3.1, M10 > 1.4.1.12

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Multiple ../ sequences in HTTP requests
  • Access attempts to sensitive system paths

Network Indicators:

  • HTTP requests containing ../ sequences
  • Unusual file extensions in requests to CoreSense devices

SIEM Query:

http.uri contains "../" AND (device.vendor contains "ABB" OR device.model contains "CoreSense")

πŸ”— References

πŸ“€ Share & Export