Critical vulnerabilities reported in ABB Cylon Aspect building management systems
Take action: If you have ABB Cylon Aspect Building Management Systems make sure the systems are isolated from the internet. Then immediately update firmware to version 3.08.04-s01 to fix critical authentication bypass vulnerabilities that could give attackers complete control of your building systems.
Learn More
ABB has patched multiple security vulnerabilities affecting its Cylon Aspect Building Management System (BMS) and Building Automation System (BAS) product lines.
Vulnerability summary
- CVE-2025-53187 (CVSS score 9.8) - Authentication Bypass Using an Alternate Path or Channel, tracked as CVE-2025-53187 (CVSS score 9.8), represents the most critical vulnerability affecting all ASPECT firmware versions prior to 3.08.04-s01. This flaw originated from debugging code that was mistakenly included in production firmware releases, creating an unintended authentication bypass mechanism that allows attackers to circumvent normal security controls.
- CVE-2025-7679 (CVSS score 8.1) - Missing Authentication for Critical Function, tracked as CVE-2025-7679 (CVSS score 8.1), allows users to bypass authentication mechanisms entirely and affects all versions of ASPECT firmware. This vulnerability enables unauthorized access to critical system functions without requiring valid credentials.
- CVE-2025-7677 (CVSS score 5.9) - Classic Buffer Overflow vulnerability, tracked as CVE-2025-7677 (CVSS score 5.9), affects all versions of ASPECT firmware and enables denial-of-service attacks when unauthorized users gain access to the local network. This vulnerability results from improper input validation that fails to check buffer size limits during data copying operations.
Affected versions include:
- ABB ASPECT-Enterprise ASP-ENT-x systems running firmware versions prior to 3.08.04-s01,
- ABB NEXUS Series NEX-2x devices with firmware versions prior to 3.08.04-s01,
- ABB NEXUS Series NEXUS-3-x systems running firmware versions prior to 3.08.04-s01,
- ABB MATRIX Series MAT-x devices with firmware versions prior to 3.08.04-s01.
Successful exploitation could enable attackers to assume complete control of building management systems, potentially disrupting critical building operations including HVAC controls, lighting systems, security mechanisms, and fire safety systems.
ABB has released firmware version 3.08.04-s01 to patch the critical authentication bypass vulnerability (CVE-2025-53187), and organizations should prioritize immediate deployment of this update. The buffer overflow and missing authentication vulnerabilities continue to affect all ASPECT firmware versions.
ABB strongly recommends that ASPECT devices should never be exposed directly to the Internet. Organizations requiring remote access to ASPECT systems should implement these connections exclusively through VPN gateways.