CVE-2025-6074
CWE-321漏洞涉及硬编码密钥风险。启用REST接口时,攻击者若获取源代码和控制网络访问权限,可绕过身份验证并获取MQTT配置数据。ABB建议闲置时禁用REST接口,默认已禁用无风险。RMC-100不适用于公共网络,需网络分段以增强安全。 2025-7-15 09:40:0 Author: claroty.com(查看原文) 阅读量:1 收藏

Medium Threat

CWE-321 USE OF HARD-CODED CRYPTOGRAPHIC KEY:

When the REST interface is enabled by the user, and an attacker gains access to the source code and the control network, the attacker can bypass REST interface authentication and gain access to MQTT configuration data.

ABB recommends disabling the REST interface when it is not being used to configure the MQTT functionality. By default, when the REST interface is disabled so there is no risk. The RMC-100 is not intended for access over public networks such as the Internet. An attacker would need access to the user's private control network to exploit these vulnerabilities. Proper network segmentation is recommended.


文章来源: https://claroty.com/team82/disclosure-dashboard/cve-2025-6074
如有侵权请联系:admin#unsafe.sh