CVE-2025-9574

10.0 CRITICAL

📋 TL;DR

CVE-2025-9574 is a critical missing authentication vulnerability in ABB ALS-mini-s4 IP and ALS-mini-s8 IP devices that allows unauthenticated attackers to execute critical functions. This affects all firmware versions with serial numbers from 2000 to 5166, potentially compromising industrial control systems.

💻 Affected Systems

Products:
  • ABB ALS-mini-s4 IP
  • ABB ALS-mini-s8 IP
Versions: All firmware versions
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with serial numbers from 2000 to 5166. The vulnerability exists in the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, unauthorized control of connected equipment, physical damage to industrial processes, and potential safety incidents.

🟠

Likely Case

Unauthorized access to device configuration, manipulation of control parameters, disruption of industrial operations, and data exfiltration.

🟢

If Mitigated

Limited impact if devices are isolated in segmented networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - Directly exposed devices can be compromised without authentication from anywhere on the internet.
🏢 Internal Only: HIGH - Even internally, any network access to these devices can lead to compromise due to missing authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication, making exploitation straightforward for attackers with network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=4TZ00000006007&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB portal. 2. Backup current configuration. 3. Apply firmware update via web interface or management tool. 4. Verify update applied successfully. 5. Restart device if required.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in dedicated VLANs with strict firewall rules

Access Control Lists

all

Implement IP-based access restrictions to limit connections to authorized management systems only

🧯 If You Can't Patch

  • Segment devices in isolated network zones with no internet access
  • Implement strict firewall rules allowing only necessary traffic from authorized IP addresses

🔍 How to Verify

Check if Vulnerable:

Check device serial number via web interface or CLI. If serial is between 2000-5166, device is vulnerable.

Check Version:

Check via web interface at System > About or via SNMP query to device

Verify Fix Applied:

Verify firmware version after update matches vendor-recommended patched version and test authentication requirements.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to critical functions
  • Configuration changes from unauthorized IP addresses
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual traffic patterns to device management interfaces
  • Connections from unexpected IP ranges to device ports
  • Protocol anomalies in industrial communication

SIEM Query:

source="industrial_device" AND (event_type="configuration_change" OR event_type="unauthorized_access") AND NOT src_ip IN (authorized_management_ips)

🔗 References

📤 Share & Export