CVE-2025-4677
📋 TL;DR
CVE-2025-4677 is an insufficient session expiration vulnerability in ABB WebPro SNMP Card PowerValue devices that allows attackers to reuse expired sessions to gain unauthorized access. This affects industrial power monitoring systems running vulnerable firmware versions. Organizations using these ABB devices for power infrastructure monitoring are at risk.
💻 Affected Systems
- ABB WebPro SNMP Card PowerValue
- ABB WebPro SNMP Card PowerValue UL
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain persistent administrative access to power monitoring systems, potentially manipulating power readings, disrupting monitoring capabilities, or using the device as an entry point to industrial control networks.
Likely Case
Unauthorized users access monitoring dashboards, view sensitive power consumption data, or perform limited configuration changes without proper authentication.
If Mitigated
With proper network segmentation and access controls, impact is limited to the specific device with no lateral movement to critical systems.
🎯 Exploit Status
Exploitation requires access to network sessions and understanding of session management flaws. No public exploits available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.1.8.K
Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2CRT000009&LanguageCode=en&DocumentPartId=&Action=Launch
Restart Required: Yes
Instructions:
1. Download firmware update from ABB portal. 2. Backup current configuration. 3. Upload new firmware via web interface. 4. Reboot device. 5. Verify firmware version and functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate ABB WebPro devices on separate VLANs with strict firewall rules limiting access to authorized management stations only.
Session Timeout Reduction
allConfigure web interface to use shorter session timeout values if available in device settings.
🧯 If You Can't Patch
- Implement strict network access controls allowing only specific IP addresses to access the web interface
- Monitor device logs for unusual session activity and unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Access device web interface, navigate to System Information page, check firmware version. If version is 1.1.8.K or earlier, device is vulnerable.
Check Version:
No CLI command available. Check via web interface at System > Information or via SNMP OID if configured.
Verify Fix Applied:
After patching, verify firmware version shows higher than 1.1.8.K. Test session expiration by logging in, waiting for timeout, then attempting to reuse old session tokens.
📡 Detection & Monitoring
Log Indicators:
- Multiple successful logins from same session ID after long periods
- Session tokens being reused after logout/timeout events
- Administrative actions from expired user sessions
Network Indicators:
- HTTP requests with old session cookies to administrative endpoints
- Unusual session duration patterns in web traffic
SIEM Query:
source="ABB_WebPro" AND (event_type="session_reuse" OR session_duration>3600)