CVE-2025-9574
ABB · ABB ALS-mini-s4 IP, ABB ALS-mini-s8 IP
A critical vulnerability has been identified in specific ABB industrial control system products, which allows an attacker to execute critical functions without any authentication.
Executive summary
A critical vulnerability has been identified in specific ABB industrial control system products, which allows an attacker to execute critical functions without any authentication. Successful exploitation could enable a remote, unauthenticated attacker to take full control of affected devices, potentially leading to operational disruption, equipment damage, or safety incidents in industrial environments.
Vulnerability
The vulnerability is a "Missing Authentication for Critical Function" flaw. This means that the device's firmware does not require any credentials or verification before allowing access to sensitive, high-privilege operations. An unauthenticated attacker with network access to the device can send specially crafted requests to execute commands, modify configurations, or otherwise control the device's core functions as if they were a legitimate administrator.
Business impact
This is a critical severity vulnerability with a CVSS score of 9.1, posing a significant risk to operational technology (OT) environments. Exploitation could grant an attacker direct control over industrial processes managed by the affected ABB devices. Potential consequences include manipulation of physical systems, production stoppages, damage to expensive industrial equipment, and the creation of unsafe operating conditions that could endanger personnel. The direct impact on business operations could result in significant financial loss, reputational damage, and potential regulatory scrutiny.
Remediation
Immediate Action: Organizations must prioritize applying the vendor-supplied firmware update to all affected devices to remediate the vulnerability. After patching, system administrators should actively monitor for any signs of exploitation attempts by reviewing device and network access logs for unusual or unauthorized activity.
Proactive Monitoring: Implement enhanced network monitoring focused on traffic to and from the affected ABB devices. Look for anomalous communication patterns, unexpected commands, or connection attempts from untrusted IP addresses or network segments. Configure logging to capture all administrative actions and review these logs regularly for any changes made outside of scheduled maintenance windows.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
- Network Segmentation: Isolate the affected devices from the internet and corporate IT networks. Place them in a secured OT network zone behind a firewall.
- Access Control: Strictly limit network access to the devices, ensuring that only authorized management systems and personnel can communicate with them.
- Intrusion Detection/Prevention System (IDS/IPS): Deploy an IDS/IPS with rules capable of detecting and blocking network traffic patterns associated with the exploitation of missing authentication vulnerabilities.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.1 and the potential for severe operational impact, we strongly recommend that organizations treat this vulnerability with the highest priority. The lack of an authentication requirement makes these devices an attractive target for attackers. Organizations must immediately identify all affected ABB ALS-mini-s4 IP and ALS-mini-s8 IP devices within their environment and apply the vendor-provided patch. If patching cannot be performed immediately, the compensating controls listed above, particularly network segmentation and access control, must be implemented without delay to reduce the attack surface.