PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-47612 Telit Cinterion CVE debrief

CVE-2023-47612 affects ABB Arctic Wireless Gateways ARG600, ARC600, and ARR600 that use the Telit PLS62-W wireless modem module. According to the CISA advisory, an attacker with physical access to the target system could gain read/write access to files and directories on the modem module, including hidden content. The supplied guidance emphasizes compensating controls such as limiting physical access, reducing exposed management services, and using secure remote-access paths.

Vendor
Telit Cinterion
Product
Arctic Wireless Gateways
CVSS
MEDIUM 6.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-07
Original CVE updated
2025-04-07
Advisory published
2025-04-07
Advisory updated
2025-04-07

Who should care

ABB Arctic Wireless Gateway owners and operators, OT/ICS administrators, field service teams, and site security personnel responsible for protecting devices that may be physically accessible.

Technical summary

The advisory describes a Files or Directories Accessible to External Parties issue on the wireless modem module used in ABB Arctic Wireless Gateways. The supplied CVSS vector is CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating physical proximity is required but the potential impact to confidentiality, integrity, and availability is high. Affected products listed in the CSAF product tree are Arctic Wireless Gateway ARG600, ARC600, and ARR600 with the Telit PLS62-W wireless modem module.

Defensive priority

Medium, with higher operational priority in environments where the gateways or modem modules are physically reachable by unauthorized people.

Recommended defensive actions

  • Restrict physical access to the affected gateway and modem hardware.
  • Do not expose SSH to public networks; keep it reachable only through a private network or secure VPN.
  • Use OpenVPN for remote administration when SSH is required.
  • Contact the cellular provider/mobile network operator about disabling binary SMS for the subscription; disable SMS entirely if it is not needed.
  • Consider using a private cellular access point to reduce exposure.
  • Follow ABB's general security recommendations and life-cycle guidance for the product line.

Evidence notes

All facts in this debrief are drawn from the supplied CISA CSAF advisory ICSA-25-100-09 and its listed references. The source identifies ABB as the vendor, names the three affected gateway models, describes the physical-access read/write issue on the wireless modem module, and provides the mitigation guidance. The supplied enrichment does not mark this CVE as a KEV item.

Official resources

Publicly disclosed in CISA advisory ICSA-25-100-09 on 2025-04-07. The supplied enrichment does not indicate KEV inclusion.