# Critical Path Traversal Vulnerability Exposes ABB PCM600 Control Systems to Arbitrary Code Execution
## The Threat
ABB's Protection and Control IED Manager (PCM600) software contains a critical vulnerability that allows attackers to execute arbitrary code on systems running affected versions. Tracked as CVE-2018-1002208, the flaw exists within the SharpZip.dll library included in PCM600 and can be exploited through specially crafted messages sent directly to the system node, bypassing traditional security perimeters.
The vulnerability represents a significant risk to critical manufacturing infrastructure worldwide. PCM600 is widely deployed in power generation, distribution systems, and industrial control environments where reliability and security are paramount. An attacker who successfully exploits this path traversal weakness gains the ability to execute arbitrary commands with the privileges of the affected process, potentially allowing them to modify system behavior, disable protective functions, or launch cascading failures across interconnected systems.
What makes this vulnerability particularly dangerous is its local attack vector combined with user interaction requirements—while exploitation requires some level of access and social engineering, the barrier to entry is notably lower than remote code execution vulnerabilities. Organizations running unpatched versions from 1.5 to 2.13 remain exposed to this risk, particularly in environments where system administrators may not have awareness of the vulnerability or face operational constraints preventing timely patching.
## Severity and Impact
| Metric | Details |
|--------|---------|
| CVE Identifier | CVE-2018-1002208 |
| CVSS v3.1 Score | 4.4 (MEDIUM) |
| CVSS Vector | AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N |
| CWE | CWE-22: Improper Limitation of a Pathname to a Restricted Directory |
| Attack Vector | Local |
| Attack Complexity | High |
| Privileges Required | Low |
| User Interaction | Required |
| Scope | Unchanged |
| Confidentiality Impact | None |
| Integrity Impact | High |
| Availability Impact | None |
The MEDIUM severity rating reflects the local attack vector and authentication requirements, but the integrity impact—the ability to modify files and execute code—remains significant. In industrial control environments, even a MEDIUM-rated vulnerability can have outsized consequences if it enables modification of safety-critical configurations or protective logic.
## Affected Products
The following versions of ABB PCM600 are vulnerable:
Organizations should verify their installed version through ABB's software interface or system administration tools. Version 2.14 and later contain the necessary patches.
### Compatibility Consideration
ABB has noted a critical compatibility issue: RE_630 protection relays are not compatible with PCM600 version 2.14. Organizations currently running PCM600 with RE_630 protection relays cannot upgrade without replacing or bypassing the relay hardware. For these environments, ABB recommends implementing compensating security controls at the network and system level rather than attempting the upgrade.
## Mitigations
### Immediate Actions
Patch to Version 2.14: ABB released version 2.14 as the corrected version for CVE-2018-1002208. Organizations without RE_630 hardware compatibility concerns should prioritize deployment of this update at the earliest opportunity. Patching should follow standard change management procedures to minimize operational disruption, but given the arbitrary code execution risk, expedited deployment is recommended.
For Systems With RE_630 Relays: Since upgrading to the patched version is not feasible for systems using RE_630 protection relays, organizations should implement the following defense-in-depth measures:
### Network Segmentation and Access Controls
### Administrative Controls
### Additional Defense Layers
## References
For complete technical details and remediation guidance, consult the following resources:
## Recommendations for Security Teams
Organizations operating ABB PCM600 systems should treat this vulnerability with appropriate urgency despite its MEDIUM CVSS rating. Conduct a rapid inventory of all PCM600 deployments to identify affected versions and hardware compatibility constraints. For systems that can be updated, prioritize patching within 30 days. For systems with RE_630 relays, begin implementation of compensating controls immediately and develop a longer-term upgrade strategy that includes hardware replacement or relay migration.
Given the critical nature of manufacturing environments, coordinate patching efforts with operational teams to schedule updates during maintenance windows that minimize production impact. Simultaneously, activate enhanced monitoring and logging on unpatched systems to detect any exploitation attempts during the remediation window.
Report any suspected exploitation to ABB PSIRT and coordinate with CISA for incident response guidance if compromise is suspected.