PatchSiren cyber security CVE debrief
CVE-2024-10210 B&R Industrial Automation GmbH CVE debrief
CVE-2024-10210 is a high-severity vulnerability in the APROL Web Portal used by B&R APROL versions before 4.4-00P5. According to the CISA advisory, an authenticated network-based attacker may be able to access data from the file system. B&R recommends applying the patch or upgrading to a non-vulnerable version and changing secrets/passwords after remediation.
- Vendor
- B&R Industrial Automation GmbH
- Product
- B&R APROL
- CVSS
- HIGH 8.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-03-24
- Original CVE updated
- 2025-03-24
- Advisory published
- 2025-03-24
- Advisory updated
- 2025-03-24
Who should care
Organizations running B&R APROL, especially teams responsible for the APROL Web Portal, OT operations, and industrial control system security. Prioritize this if authenticated users have access to the portal or if the environment relies on sensitive local file data.
Technical summary
The advisory describes an External Control of File Name or Path issue in the APROL Web Portal. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N, which indicates remote network reachability, required authentication, no user interaction, high confidentiality impact, and low integrity impact. The affected product is listed as B&R APROL < 4.4-00P5 in the CSAF record.
Defensive priority
High. This is a remote, authenticated issue with high confidentiality impact, and the vendor advises patching or upgrading at the earliest convenience.
Recommended defensive actions
- Apply the vendor patch or upgrade to a non-vulnerable B&R APROL version as soon as practical.
- Use the vendor manual to confirm the installed APROL version before and after remediation.
- After updating, change passwords and other secrets referenced by the vendor advisory.
- Review who can authenticate to the APROL Web Portal and restrict access to only required operators and systems.
- Follow the linked CISA and B&R industrial-control-system defense-in-depth guidance for layered protections.
Evidence notes
Primary evidence comes from the CISA CSAF advisory ICSA-25-093-05 for CVE-2024-10210, which identifies the flaw as an External Control of File Name or Path issue in the APROL Web Portal and lists the affected product as B&R APROL < 4.4-00P5. The advisory also includes vendor remediation guidance to patch or upgrade and to change passwords/secrets afterward. Official reference links from CISA and B&R were used as the evidence corpus; no unsupported exploitation claims are included.
Official resources
-
CVE-2024-10210 CVE record
CVE.org
-
CVE-2024-10210 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the CSAF advisory ICSA-25-093-05 for CVE-2024-10210 on 2025-03-24, with the initial revision marked 1.0.0. The CVE record and source advisory share the same publication date in the supplied corpus.