CVE-2025-13777
High
|7.2Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass authentication and gain unauthorized access to ABB AWIN GW100 and GW120 devices, potentially letting them control or manipulate the system. To exploit this, the attacker needs to capture valid authentication data and replay it, which could happen if the data is not properly secured during transmission.
Technical Description
Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.
CVSS Vector Analysis
Attack VectorAdjacent Network
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$1,421($1K-$5K)
Vendor Response
Grade APatched in 2 days
Quick Information
Published
Mar 13, 2026
25 days ago
Last Modified
Mar 16, 2026
22 days ago