RMC-100 Security Snafu: How to Avoid a Digital Disaster!
View CSAF: ABB’s RMC-100 is vulnerable to attacks thanks to a hard-coded cryptographic key and stack-based buffer overflow. While it’s not intended for internet fame, hackers could still crash the party. Solution? Keep the REST interface off unless you want your MQTT data to be the talk of the cyber town!

Hot Take:
ABB’s RMC-100 vulnerabilities are like leaving your front door wide open, but only if you live in a rare dimension where doors are secretly hidden in the depths of your private control network. Just make sure not to invite the neighborhood hackers over for tea.
Key Points:
- ABB’s RMC-100 is under the spotlight for vulnerabilities due to the REST interface being enabled.
- Exploits include unauthorized access to MQTT configuration data and denial-of-service conditions.
- Multiple CVEs with CVSS scores ranging up to 8.2 highlight the severity.
- ABB suggests disabling the REST interface by default for safety.
- Vera Mens from Claroty Team82 should get applause for discovering these issues.
Already a member? Log in here
