CVE-2025-11043
Improper Certificate Validation in Automation Studio OPC-UA Client Enables MITM
Publication date: 2026-01-19
Last updated on: 2026-01-19
Assigner: Asea Brown Boveri Ltd. (ABB)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| b&r_automation | automation_studio | to 6.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-295 | The product does not validate, or incorrectly validates, a certificate. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11043 is an Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in B&R Automation Studio versions before 6.5. It allows an unauthenticated attacker on the network to spoof a trusted server by presenting maliciously crafted certificates that pass validation checks. This enables the attacker to intercept and manipulate data exchanges between Automation Studio and the server by redirecting or intercepting network communications. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker to intercept and interfere with sensitive data exchanges between Automation Studio and its servers. The attacker can manipulate or steal confidential information, compromising the confidentiality and integrity of your data. Since no privileges or user interaction are required, and the attack can be performed remotely over the network, it poses a significant security risk until the software is updated. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating Automation Studio to version 6.5 or later, which fixes the certificate validation issue in the ANSL over TLS and OPC-UA clients. Additionally, operate Automation Studio within a trusted environment such as ABB ICS Cyber Security Reference Architecture Level 2, isolate automation networks behind firewalls, restrict physical and network access, minimize network exposure, ensure all software and firmware are up to date, scan imported data for malware, and use secure remote access methods like VPNs. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific commands or detailed detection methods for identifying this vulnerability on your network or system. However, since the vulnerability involves improper certificate validation in the OPC-UA and ANSL over TLS clients of Automation Studio prior to version 6.5, detection could involve monitoring network traffic for suspicious TLS certificate exchanges or attempts to intercept or spoof server certificates. It is recommended to verify the Automation Studio version in use and ensure it is updated to 6.5 or later to mitigate the vulnerability. For precise detection commands or tools, consult B&R service organizations or ABB cybersecurity resources. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not specify how this vulnerability directly affects compliance with common standards and regulations such as GDPR or HIPAA.