<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>B&amp;R Automation Studio &lt;6.5 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/br-automation-studio-6.5/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/br-automation-studio-6.5/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB B&amp;R Automation Studio Improper Certificate Validation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-abb-automation-studio-vuln/</link><pubDate>Tue, 05 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-abb-automation-studio-vuln/</guid><description>ABB B&amp;R Automation Studio versions before 6.5 are vulnerable to improper certificate validation (CVE-2025-11043), potentially allowing an unauthenticated attacker to intercept and interfere with data exchanges, necessitating patching and secure network configurations.</description><content:encoded><![CDATA[<p>ABB B&amp;R Automation Studio versions prior to 6.5 contain an improper certificate validation vulnerability in the OPC-UA client and ANSL over TLS client implementations. This flaw, identified as CVE-2025-11043, could enable an unauthenticated attacker with network access to intercept and manipulate data exchanges between Automation Studio and a server.  The vulnerability was discovered by ABB as part of their internal security analysis. Exploitation could allow an attacker to masquerade as a trusted party. ABB recommends upgrading to version 6.5, which addresses this vulnerability, and operating B&amp;R Automation Studio within Level 2 of the ABB ICS Cyber Security Reference Architecture to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the targeted system, either through direct connection, misconfigured firewalls, or malware infection.</li>
<li>Attacker intercepts network traffic between the B&amp;R Automation Studio client and the OPC-UA or ANSL over TLS server.</li>
<li>Attacker redirects the communication to a compromised node under their control, manipulating network routing or name resolution.</li>
<li>Attacker generates a maliciously crafted server certificate.</li>
<li>The attacker presents the malicious certificate to the B&amp;R Automation Studio client during the TLS handshake.</li>
<li>Due to the improper certificate validation, the B&amp;R Automation Studio client accepts the malicious certificate.</li>
<li>Attacker intercepts and modifies data exchanged between the client and the legitimate server.</li>
<li>The attacker gains the ability to spoof a trusted server, potentially leading to the disclosure of confidential information or alteration of data in transit.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-11043 allows an attacker to perform man-in-the-middle attacks, potentially leading to the disclosure of sensitive data or the manipulation of control system processes.  The vulnerability affects ABB B&amp;R Automation Studio users in critical manufacturing and other sectors worldwide. Without proper patching and network segmentation, attackers can gain unauthorized access to ICS communications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB B&amp;R Automation Studio version 6.5, which addresses CVE-2025-11043.</li>
<li>Implement network segmentation to minimize network exposure for control system devices, as recommended by CISA.</li>
<li>Operate B&amp;R Automation Studio within Level 2 of the ABB ICS Cyber Security Reference Architecture to reduce the risk of successful exploitation.</li>
<li>Monitor network traffic for unexpected redirections or connections to untrusted servers using network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>certificate validation</category><category>man-in-the-middle</category></item></channel></rss>