LVS MConfig Insecure memory handling
Plan Patch7.44TZ00000006008Oct 8, 2025
Attack VectorLocal
Auth RequiredLow
ComplexityHigh
User InteractionRequired
Summary
ABB MConfig versions 1.4.9.21 and earlier contain insecure memory handling that allows an attacker with local network access to read sensitive information from the application's memory. The vulnerability requires user interaction and limited user privileges to exploit. ABB has patched this in version 1.4.9.22.
What this means
What could happen
An attacker with local network access to MConfig could read sensitive information stored in application memory, potentially exposing credentials, configuration data, or other confidential details used by the control system.
Who's at risk
MConfig users in utilities and industrial settings where the application is used for configuration management. This affects any operator or technician who relies on MConfig for device or system management, particularly where configuration data or credentials may be sensitive.
How it could be exploited
An attacker on the local network exploits insecure memory handling in MConfig (version 1.4.9.21 and earlier) to read application memory and extract sensitive information. The attack requires local network access and user interaction to trigger.
Prerequisites
- Local network access to the MConfig application
- User with limited privileges (or ability to interact with a privileged user)
- User interaction required (UI component involved in exploitation)
Local network access requiredUser interaction requiredLow attack complexityAffects confidentiality of sensitive data
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
MConfig≤ 1.4.9.211.4.9.22
Remediation & Mitigation
0/3
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate MConfig to version 1.4.9.22 or later
Long-term hardening
0/2HARDENINGImplement network segmentation to restrict local network access to MConfig systems to authorized personnel and workstations only
HARDENINGReview and apply defensive measures outlined in MConfig product instruction manual, particularly in the 'Mitigation factors' section
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/55716216-5306-4a94-b0c0-40cdc857ac54