PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-40674 ABB CVE debrief

CVE-2022-40674 is a high-severity local privilege-escalation issue affecting ABB M2M Gateway products, including ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3. According to the CISA/ABB advisory published on 2025-04-07, a local user who can write to UNIX domain sockets may bypass access controls and manipulate the multipath setup, which can lead to root-level privilege escalation. The advisory attributes the flaw to mishandled repeated keywords, where arithmetic ADD is used instead of bitwise OR.

Vendor
ABB
Product
ABB M2M Gateway ARM600
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-07
Original CVE updated
2025-04-07
Advisory published
2025-04-07
Advisory updated
2025-04-07

Who should care

Organizations running ABB ARM600 or ABB M2M Gateway deployments, especially OT/industrial environments where local accounts, maintenance access, or shared administrative tooling could expose the affected services. Security teams should also care if the device is placed in less-trusted network zones or if local access is available to contractors, operators, or support staff.

Technical summary

The advisory describes a local attack path against ABB M2M Gateway components. A local user with the ability to write to UNIX domain sockets can bypass access controls and affect multipath configuration because repeated keywords are processed incorrectly; the underlying logic uses arithmetic ADD when the intended operation is bitwise OR. The result is a local privilege-escalation condition that may allow root access. Affected products listed in the source are ABB M2M Gateway ARM600 firmware 4.1.2 through 5.0.3 and ABB M2M Gateway SW 5.0.1 through 5.0.3.

Defensive priority

High. The issue is local rather than remote, but successful exploitation can result in root privilege escalation on affected ABB systems. In OT environments, local access paths, shared admin sessions, and engineering workstations can materially increase practical risk.

Recommended defensive actions

  • Verify whether any deployed ABB ARM600 or ABB M2M Gateway instances fall within the affected version ranges identified in the advisory.
  • Apply vendor remediation or upgrade guidance referenced by ABB/CISA for affected versions 4.1.2 through 5.0.3 and 5.0.1 through 5.0.3, respectively.
  • Restrict and audit local access, especially any users or services that can write to UNIX domain sockets on the affected system.
  • Follow the advisory's hardening guidance: minimize exposed services and ports, use allowlisting firewall rules, and keep unnecessary accounts and privileges disabled.
  • Use strong, non-default credentials and limit root/administrator use to tasks that explicitly require it.
  • Maintain backups, validate them, and ensure supporting engineering/configuration PCs are patched and virus-scanned before use.
  • Use continuous monitoring and intrusion-detection/prevention controls to detect anomalous activity on the OT network and host.

Evidence notes

All product scope, version ranges, and vulnerability mechanics in this debrief are drawn from the supplied CISA CSAF advisory record for ICSA-25-105-08 and its listed ABB references. The timing context uses the provided CVE published/modified timestamps (2025-04-07T10:30:00Z). No KEV listing was provided in the source corpus, so this debrief does not treat the CVE as CISA KEV-listed.

Official resources

Publicly disclosed in the CISA CSAF advisory ICSA-25-105-08 on 2025-04-07 (matching the provided CVE publication timestamp). No KEV listing was included in the supplied data.