CVE-2025-10571

ABB · ABB Ability Edgenius

A critical authentication bypass vulnerability has been identified in specific versions of the ABB Ability Edgenius platform.

Executive summary

A critical authentication bypass vulnerability has been identified in specific versions of the ABB Ability Edgenius platform. This flaw allows a remote, unauthenticated attacker to completely circumvent security controls and gain unauthorized access to the system, potentially leading to data compromise, system manipulation, and disruption of industrial operations.

Vulnerability

This vulnerability, classified as an "Authentication Bypass Using an Alternate Path or Channel" (CWE-288), allows an attacker to bypass the standard authentication mechanism. An unauthenticated remote attacker could exploit this by accessing a specific, unprotected network service, API endpoint, or hidden interface that grants access to system functionalities without requiring valid credentials. By leveraging this alternate channel, the attacker could perform actions with the privileges of an authenticated user, leading to a full compromise of the application.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.6. Exploitation could have a severe business impact, particularly given that ABB Ability Edgenius is an industrial edge platform used in operational technology (OT) environments. A successful attack could lead to unauthorized access to sensitive industrial data, manipulation of operational processes, system downtime, and potential safety risks. The direct risks to an organization include loss of data confidentiality and integrity, disruption to critical operations, significant financial losses, and reputational damage.

Remediation

Immediate Action: The primary recommendation is to update all affected instances of ABB Ability Edgenius to the latest patched version as specified by the vendor. After applying the update, security teams must actively monitor for any signs of post-remediation exploitation attempts and thoroughly review historical system and network access logs for any unusual or unauthorized activity that may have occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for direct access attempts to internal application paths or APIs that should normally be protected by authentication. Monitor for new, unauthorized user accounts or administrative actions originating from unexpected IP addresses or internal subnets. Analyze network traffic for connections that deviate from established baselines for the Edgenius platform.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:

  • Enforce strict network segmentation to isolate the ABB Ability Edgenius platform from untrusted networks, including the internet and non-essential corporate network segments.
  • Deploy a Web Application Firewall (WAF) or reverse proxy with rules specifically designed to block access to the alternate paths or channels if they become known.
  • Restrict access to the application's management interface to a limited set of authorized administrative workstations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity (CVSS 9.6) of this authentication bypass vulnerability, immediate and decisive action is required. A successful exploit could grant an attacker privileged access to critical industrial systems, posing a severe risk to operational continuity and data integrity. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature warrants an emergency patching cycle. We strongly recommend that all organizations using the affected versions of ABB Ability Edgenius apply the vendor-supplied updates without delay and implement the proactive monitoring controls outlined above.