Automation Builder’s Permission Slip-Up: A Comedic Guide to Cybersecurity Woes!
View CSAF: ABB’s Automation Builder has vulnerabilities that could let attackers overrule user management. Even if password data is encrypted, a crafty hacker might tweak the project file to bypass controls. It’s like finding a backdoor to your smart toaster—unexpected and slightly terrifying! Keep it safe with recommended security measures.

Hot Take:
ABB’s Automation Builder has been hit with a double whammy of vulnerabilities that are just itching to give cybercriminals a chance to play puppet master. But don’t worry, with a little bit of cybersecurity magic (and by magic, I mean setting “Security” to “Integrity” and “Encryption”), you can keep those hackers from turning your automation dreams into a nightmare.
Key Points:
- ABB’s Automation Builder is vulnerable to incorrect permission assignment for critical resources.
- Two vulnerabilities, CVE-2025-3394 and CVE-2025-3395, have been identified with CVSS v4 scores of 8.5 and 8.4, respectively.
- Successful exploitation could allow attackers to overrule user management.
- ABB and CISA recommend specific security settings and network isolation to mitigate risks.
- Researcher Jiho Shin reported these vulnerabilities, impacting critical infrastructure sectors globally.
Already a member? Log in here