ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway.

Plan PatchCVSS 9.89akk108470a8948May 29, 2025
ABB
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

ABB Welcome IP-Gateway firmware versions 6.20 and earlier contain vulnerabilities in embedded software components. Researchers identified 2,518 CVEs in the firmware image; ABB analysis determined 7 high-severity CVEs with proof-of-concept exploits, 34 medium-severity CVEs without public PoCs, and 403 low-severity CVEs. An attacker with network access to an exposed IP-Gateway could gain unauthorized access and compromise system confidentiality, integrity, and availability. ABB specifies that IP-Gateways should not be directly accessible from the Internet or untrusted networks and should operate behind a firewall with outbound-initiated communication.

What this means
What could happen
An attacker with network access to an ABB Welcome IP-Gateway could execute arbitrary code on the device, potentially disrupting building automation systems (HVAC, lighting, access control) or exfiltrating sensitive system and log data. The gateway is a critical connection point between building systems and management networks.
Who's at risk
Building automation operators and facility managers using ABB Welcome IP-Gateway products—particularly those with direct Internet exposure or on untrusted networks. This affects HVAC control, lighting automation, access control systems, and other building management systems that depend on the gateway for remote monitoring and control.
How it could be exploited
An attacker sends a specially crafted network packet to the IP-Gateway. The device processes the packet using vulnerable code in one of its embedded software components, allowing the attacker to execute commands on the gateway with full system privileges.
Prerequisites
  • Network access to the IP-Gateway (reachable from attacker's network)
  • IP-Gateway is exposed directly to the Internet or an untrusted network
  • Device is running vulnerable firmware version 6.20 or earlier
remotely exploitableno authentication requiredlow complexitycritical CVSS score (9.8)affects building automation systemsno patch available for MDRC variant
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (3)
2 with fix1 pending
ProductAffected VersionsFix Status
Welcome IP-Gateway Firmware≤ 6.206.25
Welcome IP-Gateway MDRC Firmware≤ 6.20No fix yet
Welcome IP-Gateway Welcome M Firmware≤ 6.206.25
Remediation & Mitigation
0/5
Do now
0/4
HARDENINGDeploy the IP-Gateway behind a firewall; restrict inbound connections to the gateway—allow only outbound-initiated communication from the gateway to management systems
HARDENINGRemove the IP-Gateway from Internet-facing networks; isolate it on a dedicated management network segment if direct Internet connectivity is required
WORKAROUNDFor Welcome IP-Gateway MDRC (no vendor fix available), implement firewall rules to block all unsolicited inbound traffic and monitor for suspicious access attempts
HARDENINGReview and restrict network access to the IP-Gateway to trusted management systems only
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Welcome IP-Gateway (models Firmware and Welcome M) to firmware version 6.25 or later
API: /api/v1/advisories/68c4126e-1280-46aa-93c1-cc8940982979

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | CVSS 9.8 - OTPulse