ABB M2M Gateway Improper Privilege Management in embedded Device-mapper-multipath (CVE-2022-41974)

high Tenable OT Security Plugin ID 503243

Synopsis

The remote OT asset is affected by a vulnerability.

Description

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08

http://www.nessus.org/u?310ae51a

http://www.nessus.org/u?71ad8a3b

http://www.nessus.org/u?506ec473

http://seclists.org/fulldisclosure/2022/Dec/4

http://seclists.org/fulldisclosure/2022/Oct/25

http://www.openwall.com/lists/oss-security/2022/10/24/2

http://www.openwall.com/lists/oss-security/2022/11/30/2

https://bugzilla.suse.com/show_bug.cgi?id=1202739

https://github.com/opensvc/multipath-tools/releases/tag/0.9.2

https://lists.debian.org/debian-lts-announce/2022/12/msg00037.html

http://www.nessus.org/u?912a33da

https://security.gentoo.org/glsa/202311-06

https://www.debian.org/security/2023/dsa-5366

http://www.nessus.org/u?2a3b4e8a

Plugin Details

Severity: High

ID: 503243

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 5/27/2025

Updated: 5/27/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:abb:sw_firmware, cpe:/o:abb:arm600_firmware

Required KB Items: Tenable.ot/ABB

Exploit Ease: No known exploits are available

Patch Publication Date: 10/29/2022

Vulnerability Publication Date: 10/29/2022

Reference Information

CVE: CVE-2022-41974

CWE: 269

ICSA: 25-105-08