<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Critical Infrastructure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/critical-infrastructure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/critical-infrastructure/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB Edgenius Management Portal Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-edgenius-auth-bypass/</guid><description>An authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.</description><content:encoded><![CDATA[<p>ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 are vulnerable to an authentication bypass (CVE-2025-10571). An attacker who has gained network access to a vulnerable Edgenius deployment can send a specially crafted message to the system node, bypassing authentication controls. Successful exploitation allows an attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications. ABB reported this vulnerability to CISA. ABB has released version 3.2.2.0 to address the vulnerability. As a mitigation, ABB advises customers to disable the Edgenius Management Portal until the upgrade can be applied.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the network where the Edgenius Management Portal is deployed.</li>
<li>The attacker identifies a vulnerable ABB Edgenius Management Portal instance (versions 3.2.0.0 or 3.2.1.1).</li>
<li>The attacker crafts a malicious message designed to exploit the authentication bypass vulnerability (CVE-2025-10571).</li>
<li>The attacker sends the specially crafted message to the system node of the Edgenius Management Portal.</li>
<li>The vulnerable Edgenius Management Portal improperly processes the crafted message, bypassing authentication.</li>
<li>The attacker leverages the bypassed authentication to install and execute arbitrary code on the system.</li>
<li>The attacker uninstalls applications, further compromising the system&rsquo;s functionality.</li>
<li>The attacker modifies the configuration of installed applications to maintain persistence and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain full control over the ABB Edgenius Management Portal. The attacker can install malicious software, uninstall critical applications, and modify configurations, leading to significant disruption of industrial processes, data theft, or further lateral movement within the OT network. Affected sectors include critical manufacturing and information technology, with deployments worldwide.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB Ability Edgenius version 3.2.2.0 to remediate CVE-2025-10571, as this version contains the vendor fix.</li>
<li>Until the upgrade is applied, disable the Edgenius Management Portal to mitigate the vulnerability as recommended by ABB.</li>
<li>Minimize network exposure for all control system devices by ensuring they are not accessible from the internet, as suggested by CISA.</li>
<li>Locate control system networks and remote devices behind firewalls, isolating them from business networks per CISA recommendations.</li>
<li>Implement the Sigma rule &ldquo;Detect ABB Edgenius Management Portal Exploitation Attempt&rdquo; to identify potential exploitation attempts based on network traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>abb</category><category>edgenius</category><category>authentication bypass</category><category>CVE-2025-10571</category><category>critical infrastructure</category></item></channel></rss>