ABB Arctic Wireless Gateways
ABB Arctic Wireless Gateways (ARG600, ARC600, ARR600, ARP600) firmware versions 3.4.10 through 3.4.13 contain multiple critical vulnerabilities (CWE-120 buffer overflow, CWE-269 improper access control, CWE-200 information exposure, CWE-22 path traversal, CWE-362 race condition). These vulnerabilities enable arbitrary code execution with elevated privileges, denial of service, and interception of unencrypted traffic. Exploitation is possible via malicious binary SMS messages to the embedded Telit PLS62-W cellular modem module or weak SSH authentication on exposed ports. The vulnerabilities reside in both the gateway firmware and the cellular modem itself, and currently no firmware patches are available.
- Network access to cellular network or SSH port (typically 22) exposed to internet
- Cellular modem module present (Telit PLS62-W) or SSH service enabled
- No authentication required for modem-based attack; weak or default SSH credentials for SSH vector
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8d1d4522-95a2-4ef9-a262-1c5ac09bca6dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.