PatchSiren cyber security CVE debrief
CVE-2025-3394 ABB CVE debrief
CVE-2025-3394 is a high-severity issue in ABB Automation Builder project handling. CISA says the product stores user management information in the project file; although password data is fully encrypted, a specially crafted project file can cause user management to be overruled. For organizations that exchange, store, or archive Automation Builder projects, this is primarily an integrity and access-control concern.
- Vendor
- ABB
- Product
- Automation Builder
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2025-05-13
- Advisory published
- 2025-05-13
- Advisory updated
- 2025-05-13
Who should care
ABB Automation Builder users and administrators, OT/ICS engineering teams, system integrators, and anyone who distributes, imports, or stores Automation Builder project files.
Technical summary
The CISA CSAF advisory for ABB Automation Builder (ICSA-25-133-04) describes a project-file tampering issue affecting ABB Automation Builder: vers:all/*. The source states that user management information is stored in the project file and that crafted contents may overrule user management, even though password data is encrypted. The advisory assigns CVSS 3.1 vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating a locally reachable, low-complexity issue with potentially severe confidentiality, integrity, and availability impact as recorded by the advisory.
Defensive priority
High priority: protect Automation Builder project files from unauthorized modification and apply ABB’s recommended security settings.
Recommended defensive actions
- In Automation Builder project settings, set Security to "Integrity" check.
- In Automation Builder project settings, set Security to "Encryption."
- Restrict write access to project files and only import project files from trusted sources.
- Review internal handling of Automation Builder project files for unauthorized changes before deployment or transfer.
- Follow CISA ICS recommended practices for hardening and defense in depth in OT environments.
Evidence notes
This debrief is based on the supplied CISA CSAF advisory JSON for ICSA-25-133-04, published and modified on 2025-05-13T06:00:00Z. The advisory identifies ABB as the vendor, Automation Builder as the affected product, and lists one affected product entry (ABB Automation Builder: vers:all/*). The remediation text in the source specifically recommends setting project Security to "Integrity" check or "Encryption." No KEV entry was supplied for this CVE.
Official resources
-
CVE-2025-3394 CVE record
CVE.org
-
CVE-2025-3394 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in advisory ICSA-25-133-04 on 2025-05-13T06:00:00Z as the initial publication.