ABB RMC-100
The RMC-100 and RMC-100 LITE controllers contain three vulnerabilities in their MQTT and REST interface implementation: unauthenticated access to MQTT configuration data, weak cryptography allowing decryption of stored MQTT broker credentials, and a denial-of-service condition in the REST configuration web server. These vulnerabilities allow an attacker with network access to the device to read sensitive configuration, decrypt credentials, or disrupt the REST interface. Exploitation requires network access to the control network but no valid credentials. The REST interface is enabled by default.
- Network access to RMC-100 REST interface (port 8080 or configured port)
- RMC-100 is on the same network or reachable via network routing
- REST interface is enabled (enabled by default)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6d5edc7f-17ff-4623-9f40-a86fa3fb574cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.