Industrial technology giant ABB is working on patches for three high-severity vulnerabilities discovered by researchers in some of the company’s network interface modules.
The vulnerabilities affect Symphony Plus SPIET800 and PNI800, which are network interface modules that enable communications between a control network and a host computer running an engineering tool or a human-machine interface (HMI).
Due to the way these products handle certain packets, an attacker who has local access to the control network or remote access to a system server can cause a denial-of-service (DoS) condition that can only be addressed with a manual reboot.
The vulnerabilities, discovered by researchers at OT cybersecurity firm Verve Industrial, have been assigned the CVE identifiers CVE-2021-22285, CVE-2021-22286 and CVE-2021-22288, and they have all been rated “high severity.”
ABB published an advisory for these vulnerabilities in February and the US Cybersecurity and Infrastructure Security Agency (CISA) released an advisory last week to inform organizations using the affected products about the risks.
The vendor’s initial advisory said patches were planned for the first quarter of 2022, but CISA’s advisory says fixes should become available in the second quarter. In the meantime, exploitation can be prevented by ensuring that malicious actors cannot access the vulnerable devices.
“The vulnerabilities do not require any specific access or permissions on the device,” Lance Lamont, software engineer at Verve, told SecurityWeek. “If a network connection can be initiated to the device the vulnerability can be exploited.”
Regarding the possibility of exploitation from the internet, Lamont explained, “In the world of OT there is typically a great deal of effort placed in isolation of internal industrial control devices and the internet in general. Numerous technologies can be utilized to mitigate vulnerabilities like this one including firewalls, VPNs, and data diodes. With properly configured OT infrastructure it would be very difficult or impossible to exploit these vulnerabilities from the internet in general.”
Exploitation of the vulnerabilities could cause disruptions in industrial environments — in addition to the direct impact on the SPIET800 and PNI800 devices, systems connected to these devices will also be affected, ABB said.
Asked to describe a theoretical worst-case scenario resulting from the exploitation of these vulnerabilities, Lamont explained, “When these vulnerabilities are exploited it causes the device to no longer interact over its network port. There is no way to remotely send commands to it or receive updates from it until the device is rebooted. Given the wide variety of applications these devices could be used for, it is difficult or impossible to describe a worst-case – it would be very different depending on the specifics of that installation.”
ABB said in its February advisory that it had not been aware of any attacks exploiting these vulnerabilities.
Related: Flaws in ABB DCS Allow Hackers to Cause Disruption in Industrial Environments
Related: Vulnerability in ABB Plant Historian Disclosed 5 Years After Discovery
Related: Vulnerability Allows Hackers to Take Control of ABB Substation Protection Devices

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
- Watch on Demand: Supply Chain & Third-Party Risk Summit Sessions
- TikTok CEO Grilled by Skeptical Lawmakers on Safety, Content
