PatchSiren cyber security CVE debrief
CVE-2023-47612 Telit Cinterion CVE debrief
CVE-2023-47612 affects ABB Arctic Wireless Gateways ARG600, ARC600, and ARR600 that use the Telit PLS62-W wireless modem module. According to the CISA advisory, an attacker with physical access to the target system could gain read/write access to files and directories on the modem module, including hidden content. The supplied guidance emphasizes compensating controls such as limiting physical access, reducing exposed management services, and using secure remote-access paths.
- Vendor
- Telit Cinterion
- Product
- Arctic Wireless Gateways
- CVSS
- MEDIUM 6.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-07
- Original CVE updated
- 2025-04-07
- Advisory published
- 2025-04-07
- Advisory updated
- 2025-04-07
Who should care
ABB Arctic Wireless Gateway owners and operators, OT/ICS administrators, field service teams, and site security personnel responsible for protecting devices that may be physically accessible.
Technical summary
The advisory describes a Files or Directories Accessible to External Parties issue on the wireless modem module used in ABB Arctic Wireless Gateways. The supplied CVSS vector is CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating physical proximity is required but the potential impact to confidentiality, integrity, and availability is high. Affected products listed in the CSAF product tree are Arctic Wireless Gateway ARG600, ARC600, and ARR600 with the Telit PLS62-W wireless modem module.
Defensive priority
Medium, with higher operational priority in environments where the gateways or modem modules are physically reachable by unauthorized people.
Recommended defensive actions
- Restrict physical access to the affected gateway and modem hardware.
- Do not expose SSH to public networks; keep it reachable only through a private network or secure VPN.
- Use OpenVPN for remote administration when SSH is required.
- Contact the cellular provider/mobile network operator about disabling binary SMS for the subscription; disable SMS entirely if it is not needed.
- Consider using a private cellular access point to reduce exposure.
- Follow ABB's general security recommendations and life-cycle guidance for the product line.
Evidence notes
All facts in this debrief are drawn from the supplied CISA CSAF advisory ICSA-25-100-09 and its listed references. The source identifies ABB as the vendor, names the three affected gateway models, describes the physical-access read/write issue on the wireless modem module, and provides the mitigation guidance. The supplied enrichment does not mark this CVE as a KEV item.
Official resources
-
CVE-2023-47612 CVE record
CVE.org
-
CVE-2023-47612 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA advisory ICSA-25-100-09 on 2025-04-07. The supplied enrichment does not indicate KEV inclusion.