9AKK108471A8107
Vulnerability from csaf_abb - Published: 2025-09-16 00:30 - Updated: 2025-11-28 08:00Summary
Terra AC wallbox Heap Memory Corruption Vulnerability
Notes
Summary
ABB is aware of vulnerabilities in the product versions listed as affected in the advisory.
An attacker who successfully exploited this vulnerability could cause the pollution of heap memory which potentially takes remote control of the product and performs a write operation to the flash memory to alter the firmware behavior.
Support
For additional instructions and support please contact your local ABB Digital Service Support ch.ups.digital@abb.com. For contact information, see ww.abb.com/contactcenters.
Information about ABB’s cyber security program and capabilities can be found at https://go.abb/cybersecurity.
Notice
The information in this document is subject to change without notice, and should not be construed as a commitment by ABB.
ABB provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall ABB or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if ABB or its suppliers have been advised of the possibility of such damages.
This document and parts hereof must not be reproduced or copied without written permission from ABB, and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose.
All rights to registrations and trademarks reside with their respective owners.
{
"document": {
"acknowledgments": [
{
"names": [
"Ryo Kato "
],
"summary": "reporting the vulnerabilities through responsible disclosure."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ABB is aware of vulnerabilities in the product versions listed as affected in the advisory. \n\nAn attacker who successfully exploited this vulnerability could cause the pollution of heap memory which potentially takes remote control of the product and performs a write operation to the flash memory to alter the firmware behavior.",
"title": "Summary"
},
{
"category": "other",
"text": "For additional instructions and support please contact your local ABB Digital Service Support ch.ups.digital@abb.com. For contact information, see ww.abb.com/contactcenters.\n\nInformation about ABB\u2019s cyber security program and capabilities can be found at https://go.abb/cybersecurity.",
"title": "Support"
},
{
"category": "legal_disclaimer",
"text": "The information in this document is subject to change without notice, and should not be construed as a commitment by ABB.\n\nABB provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall ABB or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if ABB or its suppliers have been advised of the possibility of such damages.\n\nThis document and parts hereof must not be reproduced or copied without written permission from ABB, and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose.\n\nAll rights to registrations and trademarks reside with their respective owners.\n",
"title": "Notice"
}
],
"publisher": {
"category": "vendor",
"name": "ABB PSIRT",
"namespace": "https://global.abb/group/en/technology/cyber-security/alerts-and-notifications"
},
"references": [
{
"category": "self",
"summary": "ABB CYBERSECURITY ADVISORY - PDF Version ",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A8107\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
},
{
"category": "self",
"summary": "ABB CYBERSECURITY ADVISORY - CSAF Version ",
"url": "https://psirt.abb.com/csaf/2025/9akk108471a8107.json"
},
{
"summary": "ABB E-mobility, \" Release notes Terra AC FW v1.8.34 JPN External,\" [Online]. Available:",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A7976\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch."
},
{
"summary": "ABB E-mobility, \" BCM.V3Y01.0-JP Terra AC Installation Manual V006\" [Online]. Available:",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A9488\u0026LanguageCode=en\u0026LanguageCode=ja\u0026DocumentPartId=\u0026Action=Launch."
}
],
"title": "Terra AC wallbox Heap Memory Corruption Vulnerability",
"tracking": {
"current_release_date": "2025-11-28T08:00:00.000Z",
"generator": {
"date": "2025-11-28T12:17:05.354Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.40"
}
},
"id": "9AKK108471A8107",
"initial_release_date": "2025-09-16T00:30:00.000Z",
"revision_history": [
{
"date": "2025-09-16T00:30:00.000Z",
"legacy_version": "A",
"number": "1",
"summary": "Initial version."
},
{
"date": "2025-09-28T00:30:00.000Z",
"legacy_version": "B",
"number": "2",
"summary": "DocumentID update"
},
{
"date": "2025-09-28T02:30:00.000Z",
"legacy_version": "C",
"number": "3",
"summary": "Minor corrections"
},
{
"date": "2025-10-09T00:30:00.000Z",
"legacy_version": "D",
"number": "4",
"summary": "CVSS update"
},
{
"date": "2025-10-27T00:30:00.000Z",
"legacy_version": "E",
"number": "5",
"summary": "CVE update"
},
{
"date": "2025-11-28T00:30:00.000Z",
"legacy_version": "F",
"number": "6",
"summary": "CVE update"
},
{
"date": "2025-11-28T08:00:00.000Z",
"legacy_version": "H",
"number": "7",
"summary": "Fixed Version update"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.8.33",
"product": {
"name": "ABB Terra AC wallbox (JP) \u003c=1.8.33",
"product_id": "AV1"
}
},
{
"category": "product_version",
"name": "1.8.36",
"product": {
"name": "ABB Terra AC wallbox (JP) 1.8.36",
"product_id": "FX1"
}
}
],
"category": "product_name",
"name": "Terra AC wallbox (JP)"
}
],
"category": "vendor",
"name": "ABB"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-10504",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "There is potential risk to pollute the memory when developing apps which is used to communicate with charger according to self-defined protocol if developers don\u2019t strictly follow the field length which is not been validated in firmware.",
"title": "CVE description"
}
],
"product_status": {
"fixed": [
"FX1"
],
"known_affected": [
"AV1"
]
},
"references": [
{
"category": "external",
"summary": "NVD - CVE-2025-10504",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10504"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "The problem is corrected in the following product version; apply the following update depending on product variant:\n\nTerra AC wallbox (JP) 1.8.36\nABB recommends that customers apply the update at earliest convenience.",
"product_ids": [
"AV1"
]
},
{
"category": "mitigation",
"details": "To attack with this kind of message, hackers must hijack Bluetooth first and then can send messages. Because the communication messages between BLE and charger have been encrypted. In theory, there is no way to attack the charger.",
"product_ids": [
"AV1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"AV1"
]
}
],
"title": "CVE-2025-10504"
},
{
"cve": "CVE-2025-12142",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "There is potential risk polluting the BSS memory when developing apps which is used to communicate with charger via Bluetooth according to self-defined protocol if developers configure an unexpected length of bin files.",
"title": "CVE description"
}
],
"product_status": {
"fixed": [
"FX1"
],
"known_affected": [
"AV1"
]
},
"references": [
{
"category": "external",
"summary": "NVD - CVE-2025-12142",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12142"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "The problem is corrected in the following product version; apply the following update depending on product variant:\n\nTerra AC wallbox (JP) 1.8.36\n\nABB recommends that customers apply the update at earliest convenience.",
"product_ids": [
"AV1"
]
},
{
"category": "mitigation",
"details": "To attack with this kind of message, hackers must hijack Bluetooth first and then can send messages. Because the communication messages between BLE and charger have been encrypted. In theory, there is no way to attack the charger.",
"product_ids": [
"AV1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"AV1"
]
}
],
"title": "CVE-2025-12142"
},
{
"cve": "CVE-2025-12143",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "There is potential risk polluting the stack memory when developing a customized OCPP key of \u201cRan-domDelay\u201c in backend and configuring an unexpected number in the field.",
"title": "CVE description"
}
],
"product_status": {
"fixed": [
"FX1"
],
"known_affected": [
"AV1"
]
},
"references": [
{
"category": "external",
"summary": "NVD - CVE-2025-12143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "The problem is corrected in the following product version; apply the following update depending on product variant:\n\nTerra AC wallbox (JP) 1.8.36\n\nABB recommends that customers apply the update at earliest convenience.",
"product_ids": [
"AV1"
]
},
{
"category": "mitigation",
"details": "To attack with this kind of message, hackers must hijack Bluetooth first and then can send messages. Because the communication messages between BLE and charger have been encrypted. In theory, there is no way to attack the charger.",
"product_ids": [
"AV1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"exploitCodeMaturity": "PROOF_OF_CONCEPT",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"AV1"
]
}
],
"title": "CVE-2025-12143"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…