Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
ABB’s 800xA Vulnerability: Services May Crash, Here’s How to Protect Your Systems
ABB’s 800xA Base has a vulnerability that could cause services to crash and restart. The CVSS v4 score is 6.9, with low attack complexity. Update to the latest version to mitigate risks.

Hot Take:
Well, it looks like ABB’s 800xA Base has decided that improvisation is not its strong suit. With a CVSS v4 score of 6.9, it’s trying to crash the party—literally. Time to patch up before your control systems start playing musical chairs!
Key Points:
- ABB’s 800xA Base has an improper input validation vulnerability.
- This affects versions 6.1.1-2 and prior on PC-based client/server nodes.
- Successful exploitation can cause service crashes and restarts.
- Mitigations include updating to newer versions and isolating control systems behind firewalls.
- No known public exploitation has been reported yet.