PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-2964 ABB CVE debrief

CISA’s ABB M2M Gateway advisory maps CVE-2022-2964 to ABB ARM600 firmware and ABB M2M Gateway SW releases. The issue is described as a flaw in the Linux kernel driver for ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet devices, with multiple out-of-bounds reads and possible out-of-bounds writes. Because the affected products and versions are explicitly listed by ABB/CISA, operators should treat this as a concrete OT asset inventory and mitigation task rather than a generic Linux issue.

Vendor
ABB
Product
ABB M2M Gateway ARM600
CVSS
HIGH 7.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-07
Original CVE updated
2025-04-07
Advisory published
2025-04-07
Advisory updated
2025-04-07

Who should care

ABB M2M Gateway ARM600 owners, OT/ICS administrators, integrators, and security teams responsible for ABB M2M Gateway SW or firmware deployments. Environments that use AX88179_178A-based USB-to-Ethernet devices with these products should prioritize review.

Technical summary

The supplied CISA CSAF advisory (ICSA-25-105-08) associates CVE-2022-2964 with ABB M2M Gateway ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3. The CVE description states that the Linux kernel’s driver for ASIX AX88179_178A-based USB Ethernet devices can trigger multiple out-of-bounds reads and possible out-of-bounds writes. The CVSS vector provided is CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:W/RC:C, indicating local access, low privileges, and user interaction are required.

Defensive priority

High. The advisory is for OT-related ABB products, the CVSS score is 7.3, and the source mitigation focuses on avoiding the affected USB-to-Ethernet chipset. Even with local and user-interaction requirements, the impact ratings are high and the affected version range is explicit.

Recommended defensive actions

  • Inventory ABB M2M Gateway ARM600 firmware and ABB M2M Gateway SW deployments to determine whether any affected versions are present (ARM600 firmware 4.1.2 through 5.0.3; SW 5.0.1 through 5.0.3).
  • Avoid using AX88179_178A chipset-based USB-to-Ethernet devices with affected systems, as recommended in the advisory mitigation text.
  • Review the ABB references and life-cycle management guidance linked from the advisory for vendor-supported remediation or upgrade paths.
  • Apply OT segmentation, controlled device handling, and least-privilege access around affected assets to reduce the likelihood of successful local exploitation.
  • Monitor ABB and CISA advisory updates and confirm whether your environment has any removable or USB-attached network adapters that match the affected chipset family.

Evidence notes

All claims are drawn from the supplied CISA CSAF advisory metadata and references. The advisory published on 2025-04-07 identifies ABB as the vendor, lists ABB M2M Gateway ARM600 and ABB M2M Gateway SW as affected products, provides the affected version ranges, and includes the mitigation to avoid AX88179_178A chipset-based USB-to-Ethernet devices. The source corpus also marks the item as not KEV-listed.

Official resources

The source advisory was published on 2025-04-07 and does not indicate a KEV listing. The supplied corpus ties the CVE to ABB products through the CISA CSAF affected-product tree, not through exploit reporting or a campaign claim.