PatchSiren cyber security CVE debrief
CVE-2022-2964 ABB CVE debrief
CISA’s ABB M2M Gateway advisory maps CVE-2022-2964 to ABB ARM600 firmware and ABB M2M Gateway SW releases. The issue is described as a flaw in the Linux kernel driver for ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet devices, with multiple out-of-bounds reads and possible out-of-bounds writes. Because the affected products and versions are explicitly listed by ABB/CISA, operators should treat this as a concrete OT asset inventory and mitigation task rather than a generic Linux issue.
- Vendor
- ABB
- Product
- ABB M2M Gateway ARM600
- CVSS
- HIGH 7.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-07
- Original CVE updated
- 2025-04-07
- Advisory published
- 2025-04-07
- Advisory updated
- 2025-04-07
Who should care
ABB M2M Gateway ARM600 owners, OT/ICS administrators, integrators, and security teams responsible for ABB M2M Gateway SW or firmware deployments. Environments that use AX88179_178A-based USB-to-Ethernet devices with these products should prioritize review.
Technical summary
The supplied CISA CSAF advisory (ICSA-25-105-08) associates CVE-2022-2964 with ABB M2M Gateway ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3. The CVE description states that the Linux kernel’s driver for ASIX AX88179_178A-based USB Ethernet devices can trigger multiple out-of-bounds reads and possible out-of-bounds writes. The CVSS vector provided is CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:W/RC:C, indicating local access, low privileges, and user interaction are required.
Defensive priority
High. The advisory is for OT-related ABB products, the CVSS score is 7.3, and the source mitigation focuses on avoiding the affected USB-to-Ethernet chipset. Even with local and user-interaction requirements, the impact ratings are high and the affected version range is explicit.
Recommended defensive actions
- Inventory ABB M2M Gateway ARM600 firmware and ABB M2M Gateway SW deployments to determine whether any affected versions are present (ARM600 firmware 4.1.2 through 5.0.3; SW 5.0.1 through 5.0.3).
- Avoid using AX88179_178A chipset-based USB-to-Ethernet devices with affected systems, as recommended in the advisory mitigation text.
- Review the ABB references and life-cycle management guidance linked from the advisory for vendor-supported remediation or upgrade paths.
- Apply OT segmentation, controlled device handling, and least-privilege access around affected assets to reduce the likelihood of successful local exploitation.
- Monitor ABB and CISA advisory updates and confirm whether your environment has any removable or USB-attached network adapters that match the affected chipset family.
Evidence notes
All claims are drawn from the supplied CISA CSAF advisory metadata and references. The advisory published on 2025-04-07 identifies ABB as the vendor, lists ABB M2M Gateway ARM600 and ABB M2M Gateway SW as affected products, provides the affected version ranges, and includes the mitigation to avoid AX88179_178A chipset-based USB-to-Ethernet devices. The source corpus also marks the item as not KEV-listed.
Official resources
-
CVE-2022-2964 CVE record
CVE.org
-
CVE-2022-2964 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
The source advisory was published on 2025-04-07 and does not indicate a KEV listing. The supplied corpus ties the CVE to ABB products through the CISA CSAF affected-product tree, not through exploit reporting or a campaign claim.