<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>APC4100 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/apc4100/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 16:10:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/apc4100/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB B&amp;R PCs Vulnerable to Multiple Attacks via EDK2 Network Package</title><link>https://feed.craftedsignal.io/briefs/2026-05-abb-br-pcs-vulns/</link><pubDate>Thu, 21 May 2026 16:10:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-abb-br-pcs-vulns/</guid><description>Multiple vulnerabilities in ABB B&amp;R PCs, specifically within the EDK2 Network Package, can be exploited by a network attacker to execute remote code, initiate DoS attacks, conduct DNS cache poisoning, or extract sensitive information (CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, CVE-2023-45237).</description><content:encoded><![CDATA[<p>ABB has identified multiple vulnerabilities within the EDK2 Network Package used in several B&amp;R PC product lines, affecting versions prior to the listed fixes. These vulnerabilities, discovered in 2023, stem from improper handling of network messages, specifically within the Preboot eXecution Environment (PXE) of the UEFI firmware. Successful exploitation could allow a network attacker to perform a variety of malicious actions including remote code execution, denial-of-service attacks, DNS cache poisoning, and sensitive information disclosure. The affected product lines include APC4100, APC910, C80, MPC3100, PPC1200, PPC900, APC2200, PPC2200, APC3100, and PPC3100. It is critical to apply the provided updates or mitigations to prevent potential exploitation. These vulnerabilities impact organizations that use these PCs in their industrial control systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable ABB B&amp;R PC on the network running an affected firmware version.</li>
<li>The attacker crafts a malicious DHCPv6 Advertise message with a malformed IA_NA or IA_TA option (CVE-2023-45229).</li>
<li>The attacker sends the crafted DHCPv6 message to the target PC.</li>
<li>The vulnerable EDK2 Network Package processes the malicious option, resulting in an out-of-bounds read.</li>
<li>The attacker exploits the out-of-bounds read to leak sensitive information from the device&rsquo;s memory.</li>
<li>Alternatively, the attacker crafts a malicious DHCPv6 client message with a long server ID option (CVE-2023-45230).</li>
<li>The vulnerable EDK2 Network Package processes the oversized server ID, leading to a buffer overflow.</li>
<li>The attacker leverages the buffer overflow to achieve remote code execution on the target system, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences. An attacker could gain unauthorized access to the targeted industrial control systems, leading to disruption of operations, data theft, or the execution of malicious code. The vulnerabilities could also be leveraged to perform denial-of-service attacks, rendering the affected systems unavailable. Given that the affected PCs are used within critical infrastructure sectors like energy, the impact could extend to broader societal consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-provided fixes for each affected product line (APC4100, C80, MPC3100, PPC1200, PPC900, APC2200, PPC2200, APC3100, PPC3100) as detailed in the advisory.</li>
<li>For APC910, where no patch is available, disable the vulnerable Preboot eXecution Environment (PXE) of the UEFI firmware as a mitigation.</li>
<li>If PXE functionality is required, restrict network traffic to legitimate users and block illegitimate PXE traffic, specifically related to IPv6, using a control network firewall.</li>
<li>Monitor network traffic for malformed DHCPv6 Advertise messages or DHCPv6 client messages with excessively long server IDs to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect exploitation attempts of CVE-2023-45229 and CVE-2023-45230.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ics</category><category>vulnerability</category><category>network</category></item></channel></rss>