PatchSiren cyber security CVE debrief
CVE-2022-40674 ABB CVE debrief
CVE-2022-40674 is a high-severity local privilege-escalation issue affecting ABB M2M Gateway products, including ARM600 firmware versions 4.1.2 through 5.0.3 and ABB M2M Gateway SW versions 5.0.1 through 5.0.3. According to the CISA/ABB advisory published on 2025-04-07, a local user who can write to UNIX domain sockets may bypass access controls and manipulate the multipath setup, which can lead to root-level privilege escalation. The advisory attributes the flaw to mishandled repeated keywords, where arithmetic ADD is used instead of bitwise OR.
- Vendor
- ABB
- Product
- ABB M2M Gateway ARM600
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-07
- Original CVE updated
- 2025-04-07
- Advisory published
- 2025-04-07
- Advisory updated
- 2025-04-07
Who should care
Organizations running ABB ARM600 or ABB M2M Gateway deployments, especially OT/industrial environments where local accounts, maintenance access, or shared administrative tooling could expose the affected services. Security teams should also care if the device is placed in less-trusted network zones or if local access is available to contractors, operators, or support staff.
Technical summary
The advisory describes a local attack path against ABB M2M Gateway components. A local user with the ability to write to UNIX domain sockets can bypass access controls and affect multipath configuration because repeated keywords are processed incorrectly; the underlying logic uses arithmetic ADD when the intended operation is bitwise OR. The result is a local privilege-escalation condition that may allow root access. Affected products listed in the source are ABB M2M Gateway ARM600 firmware 4.1.2 through 5.0.3 and ABB M2M Gateway SW 5.0.1 through 5.0.3.
Defensive priority
High. The issue is local rather than remote, but successful exploitation can result in root privilege escalation on affected ABB systems. In OT environments, local access paths, shared admin sessions, and engineering workstations can materially increase practical risk.
Recommended defensive actions
- Verify whether any deployed ABB ARM600 or ABB M2M Gateway instances fall within the affected version ranges identified in the advisory.
- Apply vendor remediation or upgrade guidance referenced by ABB/CISA for affected versions 4.1.2 through 5.0.3 and 5.0.1 through 5.0.3, respectively.
- Restrict and audit local access, especially any users or services that can write to UNIX domain sockets on the affected system.
- Follow the advisory's hardening guidance: minimize exposed services and ports, use allowlisting firewall rules, and keep unnecessary accounts and privileges disabled.
- Use strong, non-default credentials and limit root/administrator use to tasks that explicitly require it.
- Maintain backups, validate them, and ensure supporting engineering/configuration PCs are patched and virus-scanned before use.
- Use continuous monitoring and intrusion-detection/prevention controls to detect anomalous activity on the OT network and host.
Evidence notes
All product scope, version ranges, and vulnerability mechanics in this debrief are drawn from the supplied CISA CSAF advisory record for ICSA-25-105-08 and its listed ABB references. The timing context uses the provided CVE published/modified timestamps (2025-04-07T10:30:00Z). No KEV listing was provided in the source corpus, so this debrief does not treat the CVE as CISA KEV-listed.
Official resources
-
CVE-2022-40674 CVE record
CVE.org
-
CVE-2022-40674 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the CISA CSAF advisory ICSA-25-105-08 on 2025-04-07 (matching the provided CVE publication timestamp). No KEV listing was included in the supplied data.