ABB reports three critical flaws in FLXEON Controllers
Take action: If you are using ABB FLXEON Controllers, make sure they isolated from the internet and accessible only from trusted networks and only to trusted admins. After that, consider this an priority patch, because the flaws are very severe, one a perfect 10. Don't delay too long, this will be a problem.
Learn More
ABB is reporting three critical security vulnerabilities affecting their FLXEON Controllers product line, including FBXi, FBVi, FBTi, and CBXi models.
Vulnerability Summary
- CVE-2024-48841 (CVSS score 10) - Command Injection Vulnerability that allows remote code execution with elevated privileges through network access and could lead to complete system compromise
- CVE-2024-48849 (CVSS score 9.4) - WebSocket Origin Validation Vulnerability that enables unauthorized HTTPS requests due to insufficient session management and could allow attackers to bypass security controls
- CVE-2024-48852 (CVSS score: 9.4) - Log File Information Disclosure that enables improper disclosure of sensitive information through HTTPS access and could lead to information leakage and system compromise
The following ABB products are affected:
- FLXEON Controllers FBXi: Version 9.3.4 and prior
- FLXEON Controllers FBVi: Version 9.3.4 and prior
- FLXEON Controllers FBTi: Version 9.3.4 and prior
- FLXEON Controllers CBXi: Version 9.3.4 and prior
ABB emphasizes that these vulnerabilities are only exploitable if attackers can access the network segment where FLXEON is installed or exposed directly to the internet.
As of February 20, 2025, CISA reports no known public exploitation targeting these vulnerabilities.