CVE-2025-4676

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication on ABB WebPro SNMP Card PowerValue devices due to incorrect implementation of the authentication algorithm. Affected organizations using these devices for power monitoring and management could have unauthorized access to critical infrastructure systems. The issue impacts both PowerValue and PowerValue UL models.

💻 Affected Systems

Products:
  • ABB WebPro SNMP Card PowerValue
  • ABB WebPro SNMP Card PowerValue UL
Versions: through 1.1.8.K
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of power monitoring infrastructure allowing unauthorized control, configuration changes, or disabling of monitoring capabilities, potentially leading to operational disruption or safety issues.

🟠

Likely Case

Unauthorized access to power monitoring data, configuration viewing/modification, and potential lateral movement to connected systems.

🟢

If Mitigated

Limited impact if devices are isolated in protected networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically have low exploitation complexity once the flaw is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.1.8.K

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2CRT000009&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download updated firmware from ABB support portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface. 4. Reboot device. 5. Restore configuration if needed. 6. Verify authentication works correctly.

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected devices in separate VLANs with strict firewall rules limiting access to authorized management stations only.

Access control restrictions

all

Implement IP-based access controls on network devices to restrict connections to WebPro SNMP cards from specific management IPs only.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to isolate affected devices from untrusted networks
  • Enable detailed logging and monitoring for authentication attempts and configuration changes on affected devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SNMP query. If version is 1.1.8.K or earlier, device is vulnerable.

Check Version:

snmpget -v2c -c public <device_ip> 1.3.6.1.2.1.1.1.0

Verify Fix Applied:

After patching, attempt authentication bypass using known methods. Verify version shows >1.1.8.K. Test authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Configuration changes from unexpected IP addresses
  • Multiple authentication attempts in short time

Network Indicators:

  • SNMP or HTTP traffic to WebPro cards from unauthorized sources
  • Unusual port scanning activity targeting port 161/162 or web ports

SIEM Query:

source="webpro_logs" AND (event_type="auth_failure" OR event_type="config_change") | stats count by src_ip dest_ip

🔗 References

📤 Share & Export