PatchSiren

PatchSiren cyber security CVE debrief

CVE-2020-22218 ABB CVE debrief

CVE-2020-22218 is an out-of-bounds memory access issue in libssh2’s _libssh2_packet_add function that ABB reported through CISA for its M2M Gateway ARM600 product line. In the supplied advisory, the primary impact is a possible system crash, and the attack requires an authenticated attacker. ABB/CISA’s published mitigations focus on reducing exposure of the ARM600 to the internet and hardening network access around the gateway.

Vendor
ABB
Product
ABB M2M Gateway ARM600
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-07
Original CVE updated
2025-04-07
Advisory published
2025-04-07
Advisory updated
2025-04-07

Who should care

Operators, integrators, and defenders responsible for ABB M2M Gateway ARM600 deployments, especially OT environments using affected firmware/software ranges. Security teams should care if the gateway is reachable from untrusted networks or used in remote-access paths.

Technical summary

The advisory identifies a memory-safety flaw in libssh2’s _libssh2_packet_add path, described as allowing access to out-of-bounds memory. The supplied CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates a network-reachable issue requiring low privileges and no user interaction, with availability impact as the main consequence. CISA’s CSAF scope lists ABB M2M Gateway ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3 as affected.

Defensive priority

Medium

Recommended defensive actions

  • Determine whether any ABB M2M Gateway ARM600 firmware or ABB M2M Gateway SW deployment falls within the affected version ranges listed in the advisory.
  • Review ABB and CISA guidance for the product and move affected systems away from exposed configurations where possible.
  • Avoid exposing ARM600 components directly to the internet; if internet connectivity is required, expose only the necessary VPN port.
  • Use a private cellular APN or other segregated WAN option when available so remote traffic does not traverse the public internet.
  • Apply the allowlisting principle on firewalls and allow only required ports, protocols, source hosts, and destination hosts.
  • If the internet is used as WAN transport, terminate traffic in a DMZ and segregate the ARM600 from other networks with a firewall.
  • Change default credentials, use unique strong passwords, and restrict administrator/root use to tasks that require it.
  • Keep supporting engineering or configuration PCs updated, scan transferred files for malware, and maintain validated backups of configurations and firmware files.

Evidence notes

The source corpus is a CISA CSAF advisory (ICSA-25-105-08) published 2025-04-07 and mapped to ABB M2M Gateway ARM600 / ABB M2M Gateway SW. It explicitly states the vulnerable function is _libssh2_packet_add in libssh2, that attackers may access out-of-bounds memory, and that the issue could lead to a system crash by an authenticated attacker. The advisory’s affected-product entries list ARM600 firmware 4.1.2 through 5.0.3 and SW 5.0.1 through 5.0.3. No KEV listing is present in the supplied enrichment.

Official resources

CISA published CSAF advisory ICSA-25-105-08 for CVE-2020-22218 on 2025-04-07. The supplied enrichment does not list the issue in CISA KEV.