[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fFjx3tNsS9KhtgTWL8p8j-Kpirl1bknxkKWF78FW7cqk":3},{"article":4,"iocs":38},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":28,"category":29,"article_tags":32},"ebca1b63-bce5-4bbe-afc6-b4155c8495f6","ABB B&R Automation Runtime","abb-b-r-automation-runtime-bc2b5c","View CSAF Summary An update is available that resolves a vulnerability identified by B&Rs internal security analysis in the product versions listed as affected in this advisory. An attacker who successfully exploited these vulnerabilities could take over a remote session or execute code in the context of the user’s browser session. The following versions of ABB B&R Automation Runtime are affected: Automation Runtime \u003C6.4, 6.4 (CVE-2025-3449, CVE-2025-3448, CVE-2025-11498) CVSS Vendor Equipment Vulnerabilities v3 6.1 B&R ABB B&R Automation Runtime Generation of Predictable Numbers or Identifiers, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), Improper Neutralization of Formula Elements in a CSV File Background Critical Infrastructure Sectors: Energy Countries\u002FAreas Deployed: Worldwide Company Headquarters Location: Switzerland Vulnerabilities Expand All + CVE-2025-3449 A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automation Runtime versions before 6.4 may allow an unauthenticated network-based attacker to take over already established sessions. View CVE Details Affected Products ABB B&R Automation Runtime Vendor: B&R Product Version: Automation Runtime \u003C6.4 Product Status: fixed, known_affected Remediations Vendor fix The problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-340 Generation of Predictable Numbers or Identifiers Metrics CVSS Version Base Score Base Severity Vector String 3.1 4.2 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:R\u002FS:U\u002FC:L\u002FI:L\u002FA:N\u002FE:F\u002FRL:O\u002FRC:C CVE-2025-3448 Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session View CVE Details Affected Products ABB B&R Automation Runtime Vendor: B&R Product Version: Automation Runtime \u003C6.4 Product Status: fixed, known_affected Remediations Vendor fix The problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Metrics CVSS Version Base Score Base Severity Vector String 3.1 6.1 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N\u002FE:F\u002FRC:C CVE-2025-11498 An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 enabling a remote attacker to inject formula data into a generated CSV file. The exploitation of this vulnerability requires the attack-er to create a malicious link. The user would need to click on this link, after which the resulting CSV file additionally needs to be manually opened. View CVE Details Affected Products ABB B&R Automation Runtime Vendor: B&R Product Version: Automation Runtime \u003C6.4 Product Status: fixed, known_affected Remediations Vendor fix The problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-1236 Improper Neutralization of Formula Elements in a CSV File Metrics CVSS Version Base Score Base Severity Vector String 3.1 6.1 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N\u002FRL:O\u002FRC:C Acknowledgments ABB PSIRT reported these vulnerabilities to CISA. Notice The information in this document is subject to change without notice, and should not be construed as a commitment by B&R. B&R provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall B&R or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if B&R or its suppliers have been advised of the possibility of such damages. This document and parts hereof must not be reproduced or copied without written permission from B&R, and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose. All rights to registrations and trademarks reside with their respective owners. Mitigating factors Do not enable the System Diagnostics Manager when it is not required. Refer to section “General security recommendations” for further advise on how to keep your system secure. Workarounds Do not use Hyperlinks provided by untrusted 3rd party to access the SDM. Hyperlinks may be provided via: • Emails from unknown users • Social media channels • Messaging services • Webpages with comment functionality • QR Codes The use of external Web Application Firewalls (WAF) can mitigate attacks using reflected cross-site scripting. Frequently asked questions What causes the vulnerabilities? The vulnerabilities are caused by insufficient input sanitization and generation of predictable numbers. What is System Diagnostics Manager (SDM)? System Diagnostics Manager (SDM) is a webpage available over the Automation Runtime Webserver, showing key diagnostic information of the running controller. What is Automation Runtime (AR)? B&R Automation Runtime is a middleware system enabling customers to run applications on B&R target systems. What might an attacker use the vulnerabilities to do? An attacker who successfully exploited these vulnerabilities could cause to run arbitrary code in the context of the user’s browser session or take over the user’s session. Since the SDM currently does not process any session-specific data and also does not implement authentication mechanisms at the session level, B&R is not aware of any advantages an attacker could gain by taking over the session ID How could an attacker exploit the vulnerabilities? To exploit the XSS vulnerability CVE-2025-3448, an attacker could try to create a hyperlink including malicious script code. This hyperlink must be opened by the user to launch the attack. To exploit vulnerability CVE-2025-3449, an attacker would need to guess a user's session ID. Could the vulnerabilities be exploited remotely? Yes, an attacker who has network access to an affected system node could exploit this vulnerability. Recommended practices include that process control systems are physically protected, have no direct connections to the Internet, and are separated from other networks by means of a firewall system that has a minimal number of ports exposed. When this security advisory was issued, had this vulnerability been publicly disclosed? No, B&R discovered the vulnerabilities through its own security analysis. When this security advisory was issued, had B&R received any reports that this vulnerability was being exploited? No, B&R had not received any information indicating that this vulnerability had been exploited when this security advisory was originally issued. Legal Notice and Terms of Use This product is provided subject to this Notification (https:\u002F\u002Fwww.cisa.gov\u002Fnotification) and this Privacy & Use policy (https:\u002F\u002Fwww.cisa.gov\u002Fprivacy-policy). Recommended Practices CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability. Minimize network exposure for all control system devices and\u002For systems, and ensure they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolate them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. Advisory Conversion Disclaimer This ICSA is a verbatim republication of ABB PSIRT SA25P003 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact ABB PSIRT directly for any questions regarding this advisory. Revision History Initial Release Date: 2025-10-07 Date Revision Summary 2025-10-07 1 Initial version. 2025-10-14 2 Added information about CVE-2025-11498 2026-05-21 3 Initial CISA Republication of ABB PSIRT SA25P003 advisory Legal Notice and Terms of Use","ABB B&R disclosed three vulnerabilities (CVE-2025-3449, CVE-2025-3448, CVE-2025-11498) in Automation Runtime versions before 6.4 affecting the System Diagnostics Manager (SDM) component. The flaws enable unauthenticated attackers to hijack sessions via predictable identifiers, execute arbitrary JavaScript via reflected XSS, and inject malicious formulas into CSV files. Fix is available in Automation Runtime 6.4; SDM is disabled by default and primarily impacts systems where it is explicitly enabled.","ABB B&R Automation Runtime \u003C6.4 patched for session hijacking, XSS, and CSV injection flaws.","ICS Advisory ABB B&R Automation Runtime Release DateMay 21, 2026 Alert CodeICSA-26-141-04 Related topics: Industrial Control System Vulnerabilities, Industrial Control Systems View CSAF Summary An update is available that resolves a vulnerability identified by B&Rs internal security analysis in the product versions listed as affected in this advisory. An attacker who successfully exploited these vulnerabilities could take over a remote session or execute code in the context of the user’s browser session. The following versions of ABB B&R Automation Runtime are affected: Automation Runtime \u003C6.4, 6.4 (CVE-2025-3449, CVE-2025-3448, CVE-2025-11498) CVSS Vendor Equipment Vulnerabilities v3 6.1 B&R ABB B&R Automation Runtime Generation of Predictable Numbers or Identifiers, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), Improper Neutralization of Formula Elements in a CSV File Background Critical Infrastructure Sectors: Energy Countries\u002FAreas Deployed: Worldwide Company Headquarters Location: Switzerland Vulnerabilities Expand All + CVE-2025-3449 A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automation Runtime versions before 6.4 may allow an unauthenticated network-based attacker to take over already established sessions. View CVE Details Affected Products ABB B&R Automation Runtime Vendor:B&R Product Version:Automation Runtime \u003C6.4 Product Status:fixed, known_affected Remediations Vendor fixThe problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-340 Generation of Predictable Numbers or Identifiers Metrics CVSS Version Base Score Base Severity Vector String 3.1 4.2 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:R\u002FS:U\u002FC:L\u002FI:L\u002FA:N\u002FE:F\u002FRL:O\u002FRC:C CVE-2025-3448 Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session View CVE Details Affected Products ABB B&R Automation Runtime Vendor:B&R Product Version:Automation Runtime \u003C6.4 Product Status:fixed, known_affected Remediations Vendor fixThe problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Metrics CVSS Version Base Score Base Severity Vector String 3.1 6.1 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N\u002FE:F\u002FRC:C CVE-2025-11498 An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 enabling a remote attacker to inject formula data into a generated CSV file. The exploitation of this vulnerability requires the attack-er to create a malicious link. The user would need to click on this link, after which the resulting CSV file additionally needs to be manually opened. View CVE Details Affected Products ABB B&R Automation Runtime Vendor:B&R Product Version:Automation Runtime \u003C6.4 Product Status:fixed, known_affected Remediations Vendor fixThe problem is corrected in Automation Runtime 6.4. The System Diagnostic Manager (SDM) is disabled by default in Automation Runtime 6 and is not intended be enabled on active systems located outside properly secured production networks or in facilities lacking adequate physical and logical access controls to prevent any form of unauthorized interaction. For customers who use SDM on their systems, B&R recommends applying the update based on risk assessment at the earliest convenience. The process to install updates is described in the user manual. The step to identify the installed product version is described in the user manual. Relevant CWE: CWE-1236 Improper Neutralization of Formula Elements in a CSV File Metrics CVSS Version Base Score Base Severity Vector String 3.1 6.1 MEDIUM CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:N\u002FRL:O\u002FRC:C Acknowledgments ABB PSIRT reported these vulnerabilities to CISA. Notice The information in this document is subject to change without notice, and should not be construed as a commitment by B&R. B&R provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall B&R or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if B&R or its suppliers have been advised of the possibility of such damages. This document and parts hereof must not be reproduced or copied without written permission from B&R, and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose. All rights to registrations and trademarks reside with their respective owners. Mitigating factors Do not enable the System Diagnostics Manager when it is not required. Refer to section “General security recommendations” for further advise on how to keep your system secure. Workarounds Do not use Hyperlinks provided by untrusted 3rd party to access the SDM. Hyperlinks may be provided via: • Emails from unknown users • Social media channels • Messaging services • Webpages with comment functionality • QR Codes The use of external Web Application Firewalls (WAF) can mitigate attacks using reflected cross-site scripting. Frequently asked questions What causes the vulnerabilities? The vulnerabilities are caused by insufficient input sanitization and generation of predictable numbers. What is System Diagnostics Manager (SDM)? System Diagnostics Manager (SDM) is a webpage available over the Automation Runtime Webserver, showing key diagnostic information of the running controller. What is Automation Runtime (AR)? B&R Automation Runtime is a middleware system enabling customers to run applications on B&R target systems. What might an attacker use the vulnerabilities to do? An attacker who successfully exploited these vulnerabilities could cause to run arbitrary code in the context of the user’s browser session or take over the user’s session. Since the SDM currently does not process any session-specific data and also does not implement authentication mechanisms at the session level, B&R is not aware of any advantages an attacker could gain by taking over the session ID How could an attacker exploit the vulnerabilities? To exploit the XSS vulnerability CVE-2025-3448, an attacker could try to create a hyperlink including malicious script code. This hyperlink must be opened by the user to launch the attack. To exploit vulnerability CVE-2025-3","https:\u002F\u002Fwww.cisa.gov\u002Fnews-events\u002Fics-advisories\u002Ficsa-26-141-04",null,"2026-05-21T12:00:00+00:00","2026-05-21T18:00:26.736311+00:00",8,[18,21,23,26],{"name":19,"type":20},"ABB","vendor",{"name":22,"type":20},"B&R",{"name":24,"type":25},"B&R Automation Runtime","product",{"name":27,"type":25},"System Diagnostics Manager (SDM)","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":28,"icon":13,"name":30,"slug":31},"Vulnerabilities","vulnerabilities",[33],{"category":34},{"id":35,"icon":13,"name":36,"slug":37},"d6f63bb8-0801-486a-be7f-171400700454","IoT\u002FOT","iot-ot",[39,43,46],{"type":40,"value":41,"context":42},"cve","CVE-2025-3449","Generation of Predictable Numbers or Identifiers in SDM allowing session hijacking (CVSS 4.2 MEDIUM)",{"type":40,"value":44,"context":45},"CVE-2025-3448","Reflected XSS in System Diagnostics Manager enabling arbitrary JavaScript execution (CVSS 6.1 MEDIUM)",{"type":40,"value":47,"context":48},"CVE-2025-11498","CSV formula injection in SDM allowing malicious data injection (CVSS 6.1 MEDIUM)"]