CVE-2025-6072

7.5 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in ABB RMC-100 and RMC-100 LITE devices allows attackers to execute arbitrary code when exploiting CVE-2025-6074 and sending malformed JSON configuration data to the REST interface. This affects industrial control systems using these specific ABB products with vulnerable firmware versions. Attackers need network access to exploit this vulnerability.

💻 Affected Systems

Products:
  • ABB RMC-100
  • ABB RMC-100 LITE
Versions: RMC-100: 2105457-043 through 2105457-045; RMC-100 LITE: 2106229-015 through 2106229-016
Operating Systems: Embedded industrial control system
Default Config Vulnerable: ✅ No
Notes: Requires REST interface to be enabled by user and exploitation of CVE-2025-6074 as prerequisite.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise leading to arbitrary code execution, potential disruption of industrial processes, and lateral movement within the control network.

🟠

Likely Case

Device crash or denial of service affecting industrial operations, with potential for limited code execution in constrained environments.

🟢

If Mitigated

No impact if REST interface is disabled or network segmentation prevents access to vulnerable devices.

🌐 Internet-Facing: LOW - These are industrial control devices typically not directly internet-facing, but risk increases if improperly exposed.
🏢 Internal Only: HIGH - Significant risk within industrial control networks where attackers could gain initial foothold through other vulnerabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires chaining with CVE-2025-6074 and network access to the control system. Buffer overflow occurs in date of expiration field processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ABB advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A3623&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB portal. 2. Follow ABB's firmware update procedure for RMC devices. 3. Verify successful update and restart device.

🔧 Temporary Workarounds

Disable REST Interface

all

Disable the REST interface if not required for operations

Configure via ABB device management interface to disable REST API

Network Segmentation

all

Isolate RMC devices in separate VLAN with strict access controls

Configure firewall rules to restrict access to RMC devices from authorized systems only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RMC devices from untrusted networks
  • Deploy intrusion detection systems to monitor for exploitation attempts and buffer overflow patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via ABB management interface and compare against vulnerable ranges

Check Version:

Use ABB device management tools or check device configuration interface

Verify Fix Applied:

Verify firmware version is outside vulnerable ranges and test REST interface functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API requests
  • Device crash/restart logs
  • Buffer overflow error messages

Network Indicators:

  • Malformed JSON requests to RMC REST endpoints
  • Unusual traffic patterns to industrial control devices

SIEM Query:

source="rmc-device" AND (event="buffer_overflow" OR event="crash" OR http_request CONTAINS "date_of_expiration")

🔗 References

📤 Share & Export