<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ABB AWIN Firmware (2.0-1) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/abb-awin-firmware-2.0-1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/abb-awin-firmware-2.0-1/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</guid><description>Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).</description><content:encoded><![CDATA[<p>ABB AWIN Gateways are vulnerable to multiple security flaws that could be exploited by unauthenticated attackers. These vulnerabilities impact ABB AWIN GW100 rev.2 and GW120 devices running specific firmware versions (2.0-0, 2.0-1, 1.2-0, and 1.2-1). Successful exploitation of these vulnerabilities can lead to a denial-of-service condition via remote reboot or the disclosure of sensitive system configuration information, potentially compromising critical manufacturing infrastructure. The vulnerabilities stem from authentication bypass and missing authentication for critical functions. Firmware versions 2.1-0 for GW100 rev. 2 and 2.0-0 for GW120 address these issues.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an exposed ABB AWIN Gateway on a network (likely adjacent network).</li>
<li>Attacker sends a crafted, unauthenticated request to the targeted gateway to trigger CVE-2025-13778.</li>
<li>The ABB AWIN Gateway processes the request without authentication.</li>
<li>The gateway initiates a reboot, causing a denial-of-service condition.</li>
<li>Alternatively, the attacker sends another crafted, unauthenticated request to trigger CVE-2025-13777 or CVE-2025-13779.</li>
<li>The gateway responds to the request, disclosing sensitive system configuration information.</li>
<li>The attacker uses the disclosed information to gain further insight into the network and potentially plan further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have significant impacts, particularly within critical manufacturing sectors where these gateways are deployed. A remote reboot (CVE-2025-13778) can disrupt operations, leading to production downtime and financial losses. Disclosure of sensitive system configuration information (CVE-2025-13777, CVE-2025-13779) can provide attackers with valuable insights, enabling them to plan further attacks, such as gaining unauthorized access to other systems or manipulating industrial processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch affected ABB AWIN Gateways to the fixed versions (ABB AWIN Firmware 2.1-0 installed on ABB AWIN GW100 rev. 2 and ABB AWIN Firmware 2.0-0 installed on ABB AWIN GW120) as recommended in the ABB PSIRT security advisory 4JNO000329.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet as recommended by CISA.</li>
<li>Monitor network traffic for unauthenticated requests to ABB AWIN Gateways, specifically targeting endpoints related to system reboot or configuration retrieval using the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ics</category><category>vulnerability</category><category>industrial_control_systems</category></item></channel></rss>