ABB MV Drives
ABB MV drives contain multiple buffer overflow and improper input validation vulnerabilities (CWE-119, CWE-20, CWE-787) in the IEC online programming communication interface and CODESYS Runtime System. Exploitation requires either valid login credentials to Drive Automation Builder/Drive Composer or direct network access to send malformed packets to the drive. Successful exploitation could allow an attacker to execute arbitrary code, alter drive parameters (motor speed, torque, direction), or cause a denial-of-service condition. ABB has disabled IEC online programming communication by default in updated firmware versions and plans a CODESYS RTS library update to further harden defenses. Several older drive models (DCS880, DCT880, and certain ACS880 programs) are end-of-life with no fixes planned.
- Local network access to the drive (UDP/TCP connectivity to drive management ports)
- Valid login credentials (either through Drive Automation Builder/Drive Composer software or direct protocol access)
- IEC online programming communication enabled (enabled by default on some firmware versions)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c8706363-31c6-4e40-a910-906ae4c6fe6eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.