CVE-2025-6073
CWE-121栈溢出漏洞存在于启用REST接口的情况下。攻击者可能通过用户名或密码溢出缓冲区。ABB建议在不使用时禁用REST接口,默认情况下已禁用以避免风险。RMC-100设备不适用于公共网络如互联网。攻击者需进入用户的私有控制网络才能利用漏洞。建议进行适当的网络分段以增强安全。 2025-7-15 09:41:0 Author: claroty.com(查看原文) 阅读量:10 收藏

High Threat

CWE-121 STACK-BASED BUFFER OVERFLOW:

When the REST interface is enabled by the user, if an attacker gains access to the control network, user/password broker authentication is enabled, and CVE-2025-6074 is exploited, the attacker can overflow the buffer for the username or password.

ABB recommends disabling the REST interface when it is not being used to configure the MQTT functionality. By default, when the REST interface is disabled so there is no risk. The RMC-100 is not intended for access over public networks such as the Internet. An attacker would need access to the user's private control network to exploit these vulnerabilities. Proper network segmentation is recommended.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-6073
如有侵权请联系:admin#unsafe.sh