<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2025-11044 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2025-11044/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2025-11044/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB B&amp;R Automation Runtime Denial-of-Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-abb-automation-dos/</link><pubDate>Tue, 05 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-abb-automation-dos/</guid><description>A denial-of-service vulnerability (CVE-2025-11044) exists in ABB B&amp;R Automation Runtime versions prior to 6.5 and R4.93, where an unauthenticated attacker can exploit a race condition to cause permanent denial-of-service.</description><content:encoded><![CDATA[<p>ABB B&amp;R Automation Runtime is affected by a denial-of-service vulnerability.  Specifically, versions prior to 6.5 and prior to R4.93 are susceptible. The vulnerability, tracked as CVE-2025-11044, resides in the ANSL-Server component. An unauthenticated attacker with network access can exploit a race condition, leading to a permanent denial-of-service condition on affected devices. The vulnerability stems from an insufficient throttling and limiting mechanism in the ANSL Server. Exploitation requires access to the system network, either directly or through a misconfigured firewall. ABB recommends updating to Automation Runtime versions 6.5 or later and R4.93 or later to remediate this vulnerability. The initial report date for this vulnerability was 2026-01-19, with a CISA republication on 2026-05-05.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains network access to the target ABB B&amp;R Automation Runtime device, either through direct connection, compromised firewall, or malicious software on the network.</li>
<li>The attacker crafts a specially crafted message designed to exploit the race condition in the ANSL-Server.</li>
<li>The attacker sends the malicious message to the vulnerable ANSL-Server component of the Automation Runtime.</li>
<li>The ANSL-Server processes the message, triggering the vulnerability due to insufficient resource throttling.</li>
<li>The race condition occurs, leading to excessive resource allocation.</li>
<li>The affected device&rsquo;s resources are exhausted due to the unbounded resource allocation.</li>
<li>The Automation Runtime component becomes unresponsive, resulting in a denial-of-service condition.</li>
<li>The affected industrial control system node stops functioning, impacting critical manufacturing processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-11044 can cause a permanent denial-of-service condition on the affected ABB B&amp;R Automation Runtime devices. This can lead to the shutdown of critical manufacturing processes, resulting in production downtime, financial losses, and potential safety hazards. The vulnerability affects critical infrastructure sectors, particularly critical manufacturing, worldwide. While the advisory does not report specific victim counts, the widespread deployment of ABB B&amp;R Automation Runtime suggests a broad potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch ABB B&amp;R Automation Runtime to versions 6.5 or later, or R4.93 or later, to remediate CVE-2025-11044 as recommended by the vendor.</li>
<li>For systems that cannot be immediately patched, implement the mitigation measures suggested by ABB, such as adjusting application configurations to longer cycle times.</li>
<li>Limit the maximum data traffic and the maximum number of concurrent connections to the ANSL server of Automation Runtime on the Control Network Firewall as recommended by the vendor.</li>
<li>Deploy the following Sigma rule to detect suspicious network activity targeting the ANSL server, and tune for your specific environment.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet, as per CISA&rsquo;s recommendations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>ics</category><category>cve-2025-11044</category></item></channel></rss>