PatchSiren cyber security CVE debrief
CVE-1999-0524 ABB CVE debrief
CVE-1999-0524 covers an ICMP Timestamp Request remote date disclosure issue affecting ABB M2M Gateway ARM600 and ABB M2M Gateway SW. According to CISA’s advisory, the affected ranges are ARM600 firmware 4.1.2 through 5.0.3 and ABB M2M Gateway SW 5.0.1 through 5.0.3. The issue is network-reachable and exposes information about system time, so it is primarily a confidentiality concern rather than an integrity or availability issue.
- Vendor
- ABB
- Product
- ABB M2M Gateway ARM600
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-07
- Original CVE updated
- 2025-04-07
- Advisory published
- 2025-04-07
- Advisory updated
- 2025-04-07
Who should care
OT/ICS operators running ABB ARM600 or ABB M2M Gateway SW, network/security teams managing perimeter and OT segmentation firewalls, and asset owners responsible for firmware/version inventory in industrial environments.
Technical summary
The source describes an "ICMP Timestamp Request Remote Date Disclosure" condition: if ICMP timestamp packets are accepted, a remote system can request and receive timestamp information from the target. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating a low-complexity network attack with no privileges or user interaction required and limited confidentiality impact. CISA’s mitigation guidance is to filter ICMP types 13 and 14 from external systems at the firewall so the system time is not exposed.
Defensive priority
Medium
Recommended defensive actions
- Confirm whether ABB M2M Gateway ARM600 firmware 4.1.2 through 5.0.3 or ABB M2M Gateway SW 5.0.1 through 5.0.3 is deployed.
- Block or filter ICMP timestamp request/response traffic (ICMP types 13 and 14) at external-facing firewalls, per the CISA advisory.
- Review OT network segmentation so external hosts cannot probe control-network devices directly.
- Validate that perimeter rules and monitoring still permit only the minimum ICMP needed for operations.
- Use the linked ABB and CISA guidance to check for any vendor lifecycle or product-specific updates relevant to your deployment.
Evidence notes
Affected products and version ranges are taken from the CISA CSAF advisory ICSA-25-105-08 for ABB M2M Gateway. The mitigation text in the source explicitly recommends filtering ICMP types 13 and 14 by firewall to avoid exposing system time. The source metadata also supplies the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, which supports a confidentiality-only impact assessment.
Official resources
-
CVE-1999-0524 CVE record
CVE.org
-
CVE-1999-0524 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
This debrief uses the supplied advisory publication date of 2025-04-07 and the cited CISA/ABB source material. The provided source data did not include a KEV listing or ransomware-campaign association.