CVE-2025-6074

6.5 MEDIUM

📋 TL;DR

A hard-coded cryptographic key vulnerability in ABB RMC-100 and RMC-100 LITE devices allows attackers to bypass REST interface authentication when the REST interface is enabled. This enables unauthorized access to MQTT configuration data. Affected users are those running vulnerable firmware versions with the REST interface enabled.

💻 Affected Systems

Products:
  • ABB RMC-100
  • ABB RMC-100 LITE
Versions: RMC-100: 2105457-043 through 2105457-045; RMC-100 LITE: 2106229-015 through 2106229-016
Operating Systems: Embedded firmware
Default Config Vulnerable: ✅ No
Notes: Vulnerability only exists when REST interface is enabled by user. Default configuration may not have REST interface enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control over MQTT configuration, potentially enabling man-in-the-middle attacks, data interception, or injection of malicious commands into industrial control systems.

🟠

Likely Case

Unauthorized access to MQTT configuration data, potentially exposing sensitive industrial control system information and enabling further reconnaissance.

🟢

If Mitigated

Limited impact if REST interface is disabled or network segmentation prevents attacker access to the control network.

🌐 Internet-Facing: HIGH if REST interface is enabled and device is exposed to internet, as authentication bypass enables direct access.
🏢 Internal Only: MEDIUM if REST interface is enabled, requiring attacker to first gain internal network access before exploiting the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires: 1) REST interface enabled, 2) access to source code (to extract hard-coded key), 3) network access to device. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ABB advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A3623&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB. 2. Follow ABB's firmware update procedure for RMC-100 devices. 3. Verify firmware version after update. 4. Restart device if required by update process.

🔧 Temporary Workarounds

Disable REST Interface

all

Disable the REST interface if not required for operations

Configure via device management interface to disable REST API

Network Segmentation

all

Isolate RMC-100 devices in separate network segments with strict access controls

Implement firewall rules to restrict access to RMC-100 devices

🧯 If You Can't Patch

  • Disable REST interface immediately if not required
  • Implement strict network segmentation and access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via device management interface and verify if REST interface is enabled

Check Version:

Check via device web interface or management console for firmware version

Verify Fix Applied:

Verify firmware version is outside affected ranges and test REST interface authentication

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to REST interface
  • Authentication bypass logs
  • Unusual MQTT configuration changes

Network Indicators:

  • Unusual REST API traffic patterns
  • Unauthorized access to device REST endpoints

SIEM Query:

Search for authentication failures followed by successful REST API access on RMC-100 devices

🔗 References

📤 Share & Export