ABB M2M Gateway Out-Of-Bound Read/Write in embedded Linux Kernel (CVE-2023-42753)

high Tenable OT Security Plugin ID 503252

Synopsis

The remote OT asset is affected by a vulnerability.

Description

An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

For more information, please refer to ABB's Cybersecurity Advisory 2NGA002579. It provides a comprehensive mapping of mitigation applicability in relation to each individual vulnerability listed.

ABB recommends the following mitigations:

- Obtain a cellular private access point (APN). A dedicated private cellular access point and respective SIM card subscriptions can be requested from the cellular service provider. This service doesn't expose the traffic between remote sites and the main site to the Internet but rather uses the cellular operator's private wide area network (WAN).
Therefore, the ARM600 wouldn't need open ports to the Internet.
- Avoid exposing any system component to the Internet. If the ARM600 must be exposed to the Internet, only the VPN port should be opened towards the Internet (e.g., Patrol management connections can be configured to use a VPN tunnel, and remote administration connections can be implemented using an OpenVPN PC-client).
- The ARM600 system is by default not dependent on the name service (DNS). If the name service is not used in the system, the name service port (TCP/UDP Port 53) can be blocked by a firewall.
- Perform firewall configuration using the 'allowlisting' principle, explicitly allowing only the required ports and protocols and blocking all other traffic.
- Filter specific ICMP packets from external systems (ICMP type 13 and 14) using a firewall to avoid exposing the system time.
- If the Internet is used as a WAN medium for carrying VPN tunnels, use a demilitarized zone (DMZ) for terminating connections from the Internet. Remote connections should terminate in the DMZ network, which would be segregated from other networks by a firewall. The ARM600 server should be located in this DMZ.
- Change the default user credentials of ARM600 and Arctic wireless gateways into non-defaults and use complex non- guessable passwords with special characters. Do not reuse passwords within the system.
- Use administrator (i.e., root user) privileges only when required by the task.
- Supporting systems, such as PCs used for configuration, should be frequently updated. If possible, use dedicated site PCs for upgrading and engineering purposes. At a minimum, PCs should be investigated by running a full virus scan with recently updated signature files before introducing the PC to the OT system. Any data, such as device configurations and firmware update files, should be virus scanned prior to transferring to the Arctic system.
- Introduce a backup policy to ensure periodic backups and backup revision numbering. Consider the following:a. Check that the entire system has backups available from all applicable parts.b. Store the backups in a safe place (e.g. in an encrypted storage), restricted by role-based access control mechanisms.c. Ensure the security of the configuration PCs that may have local copies of device configurations.d. Validate the backups to ensure they are working.
- Follow cyber security best practices for installation, operation, and decommissioning as described in the product's cyber security deployment guideline and user manual.
- Use continuous monitoring (e.g., intrusion detection/prevention tools) to detect anomalies in the system.
- Consider hardening the system according to the following:a. Remove any unnecessary communication links in the system.b. If possible, close unused physical ports.c. Open only the necessary TCP/UDP ports in the configuration.d.
Remove all unnecessary user accounts.e. Restrict traffic by firewall.f. Allow the traffic only from/to necessary hosts' IP addresses (i.e., define both source and destination in the firewall rules, where possible).g. Define client IP address as allowed address in SCADA communication protocols, if such configuration is supported.h. Remove or deactivate all unused processes, communication ports, and services where possible.i. Use physical access controls to the system installations (e.g., to server rooms and device cabinets).
- In ARM600SW installations, avoid servers with AMD processors vulnerable to the following: CVE-2021-26401, CVE-2023-20569 and CVE-2023-20593.
- Avoid using AX88179_178A chipset-based USB-to-ethernet devices.

ABB strongly recommends the following (non-exhaustive) list of cyber security practices for any installation of software-related ABB products:

- Isolate special purpose networks (e.g., for automation systems) and remote devices behind firewalls and separate them from any general purpose network (e.g., office or home networks).
- Install physical controls to ensure no unauthorized personnel can access the devices, components, peripheral equipment, and networks.
- Never connect programming software or computers containing programming software to any network other than the network intended for the devices.
- Scan all data imported into the environment before use to detect potential malware infections.
- Minimize network exposure for all applications and endpoints to ensure they are not accessible from the Internet unless they are designed for such exposure and the intended use requires it.
- Ensure all nodes are always up to date with installed software, operating system, and firmware patches, as well as anti-virus and firewall updates.
- When remote access is required, use secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices.

See Also

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08

http://www.nessus.org/u?310ae51a

https://access.redhat.com/errata/RHSA-2023:7370

https://access.redhat.com/errata/RHSA-2023:7379

https://access.redhat.com/errata/RHSA-2023:7382

https://access.redhat.com/errata/RHSA-2023:7389

https://access.redhat.com/errata/RHSA-2023:7411

https://access.redhat.com/errata/RHSA-2023:7418

https://access.redhat.com/errata/RHSA-2023:7539

https://access.redhat.com/errata/RHSA-2023:7558

https://access.redhat.com/errata/RHSA-2024:0089

https://access.redhat.com/errata/RHSA-2024:0113

https://access.redhat.com/errata/RHSA-2024:0134

https://access.redhat.com/errata/RHSA-2024:0340

https://access.redhat.com/errata/RHSA-2024:0346

https://access.redhat.com/errata/RHSA-2024:0347

https://access.redhat.com/errata/RHSA-2024:0371

https://access.redhat.com/errata/RHSA-2024:0376

https://access.redhat.com/errata/RHSA-2024:0378

https://access.redhat.com/errata/RHSA-2024:0402

https://access.redhat.com/errata/RHSA-2024:0403

https://access.redhat.com/errata/RHSA-2024:0412

https://access.redhat.com/errata/RHSA-2024:0461

https://access.redhat.com/errata/RHSA-2024:0562

https://access.redhat.com/errata/RHSA-2024:0563

https://access.redhat.com/errata/RHSA-2024:0593

https://access.redhat.com/errata/RHSA-2024:0999

https://access.redhat.com/security/cve/CVE-2023-42753

https://bugzilla.redhat.com/show_bug.cgi?id=2239843

https://seclists.org/oss-sec/2023/q3/216

Plugin Details

Severity: High

ID: 503252

File Name: tenable_ot_abb_CVE-2023-42753.nasl

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 5/27/2025

Updated: 2/14/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:abb:arm600_firmware, cpe:/o:abb:sw_firmware

Required KB Items: Tenable.ot/ABB

Exploit Ease: No known exploits are available

Patch Publication Date: 9/25/2023

Vulnerability Publication Date: 9/25/2023

Reference Information

CVE: CVE-2023-42753

CWE: 787

ICSA: 25-105-08