Impact
The vulnerability is a capture‑replay flaw that allows an attacker to replay valid credentials and gain unauthorized access to the device. Key weakness is improper session validation, identified as CWE‑294, which permits bypass of the authentication mechanism. This can compromise device control and insider access, potentially leading to unauthorized configuration changes.
Affected Systems
Affected vendors: ABB AWIN GW100 rev.2 and AWIN GW120. Specific product versions impacted are AWIN GW100 rev.2 versions 2.0-0 and 2.0-1, and AWIN GW120 versions 1.2-0 and 1.2-1.
Risk and Exploitability
The CVSS score of 7.2 indicates moderate to high severity. The EPSS score of less than 1 % reflects a low probability of exploitation at this time, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack path involves capturing a valid session and replaying it over the network; no explicit remote code execution or privilege escalation is described, but the impact is immediate unauthorized access. The absence of an official workaround means risk mitigation relies on patching or isolation.
OpenCVE Enrichment