ABB AWIN Gateways
ABB AWIN gateways contain vulnerabilities in the embedded webserver that allow unauthenticated remote attackers on the local network to take control of the device, reboot it, or extract sensitive system configuration. The gateways are designed for internal network deployment behind firewalls and should not be internet-facing. An attacker with network access to the gateway can send crafted requests to the webserver, which fails to properly validate requests before executing commands or returning configuration data. Affected versions are AWIN GW100 rev. 2 firmware 2.0-0 and 2.0-1, and AWIN GW120 firmware 1.2-0 and 1.2-1. Fixed firmware versions are available.
- Network access to the AWIN gateway (typically on a local network segment)
- No authentication required to send requests to the webserver
Patching may require device reboot — plan for process interruption
/api/v1/advisories/83130942-c23d-43c9-863c-33fec1c27863Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.