CVE-2025-4677

6.5 MEDIUM

📋 TL;DR

CVE-2025-4677 is an insufficient session expiration vulnerability in ABB WebPro SNMP Card PowerValue devices that allows attackers to reuse expired sessions to gain unauthorized access. This affects industrial power monitoring systems running vulnerable firmware versions. Organizations using these ABB devices for power infrastructure monitoring are at risk.

💻 Affected Systems

Products:
  • ABB WebPro SNMP Card PowerValue
  • ABB WebPro SNMP Card PowerValue UL
Versions: through 1.1.8.K
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: These are industrial SNMP cards used for power monitoring in data centers, industrial facilities, and critical infrastructure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent administrative access to power monitoring systems, potentially manipulating power readings, disrupting monitoring capabilities, or using the device as an entry point to industrial control networks.

🟠

Likely Case

Unauthorized users access monitoring dashboards, view sensitive power consumption data, or perform limited configuration changes without proper authentication.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific device with no lateral movement to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to network sessions and understanding of session management flaws. No public exploits available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.1.8.K

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2CRT000009&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB portal. 2. Backup current configuration. 3. Upload new firmware via web interface. 4. Reboot device. 5. Verify firmware version and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ABB WebPro devices on separate VLANs with strict firewall rules limiting access to authorized management stations only.

Session Timeout Reduction

all

Configure web interface to use shorter session timeout values if available in device settings.

🧯 If You Can't Patch

  • Implement strict network access controls allowing only specific IP addresses to access the web interface
  • Monitor device logs for unusual session activity and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Access device web interface, navigate to System Information page, check firmware version. If version is 1.1.8.K or earlier, device is vulnerable.

Check Version:

No CLI command available. Check via web interface at System > Information or via SNMP OID if configured.

Verify Fix Applied:

After patching, verify firmware version shows higher than 1.1.8.K. Test session expiration by logging in, waiting for timeout, then attempting to reuse old session tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same session ID after long periods
  • Session tokens being reused after logout/timeout events
  • Administrative actions from expired user sessions

Network Indicators:

  • HTTP requests with old session cookies to administrative endpoints
  • Unusual session duration patterns in web traffic

SIEM Query:

source="ABB_WebPro" AND (event_type="session_reuse" OR session_duration>3600)

🔗 References

📤 Share & Export