Search criteria
13 vulnerabilities by weidmueller
CVE-2025-41687 (GCVE-0-2025-41687)
Vulnerability from cvelistv5 – Published: 2025-07-23 08:23 – Updated: 2025-07-23 14:03
VLAI?
Title
Weidmueller: Unauthenticated Stack-Based Buffer Overflow in u-link Management API
Summary
An unauthenticated remote attacker may use a stack based buffer overflow in the u-link Management API to gain full access on the affected devices.
Severity ?
9.8 (Critical)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SR-2TX-WL |
Affected:
V0.0 , < V1.49
(semver)
|
||||||||||||
|
||||||||||||||
Credits
Reid Wightman of Dragos Inc.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41687",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:03:42.190289Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:03:59.533Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.49",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-EU",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-US-V",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Reid Wightman of Dragos Inc."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker may use a stack based buffer overflow in the u-link Management API to gain full access on the affected devices.\u003cbr\u003e"
}
],
"value": "An unauthenticated remote attacker may use a stack based buffer overflow in the u-link Management API to gain full access on the affected devices."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T08:23:52.447Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/de/advisories/VDE-2025-052"
}
],
"source": {
"advisory": "VDE-2025-052",
"defect": [
"CERT@VDE#641805"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Unauthenticated Stack-Based Buffer Overflow in u-link Management API",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41687",
"datePublished": "2025-07-23T08:23:52.447Z",
"dateReserved": "2025-04-16T11:17:48.309Z",
"dateUpdated": "2025-07-23T14:03:59.533Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41684 (GCVE-0-2025-41684)
Vulnerability from cvelistv5 – Published: 2025-07-23 08:23 – Updated: 2025-07-23 14:04
VLAI?
Title
Weidmueller: Root Command Injection via Unsanitized Input in tls_iotgen_setting Endpoint
Summary
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting).
Severity ?
8.8 (High)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SR-2TX-WL |
Affected:
V0.0 , < V1.49
(semver)
|
||||||||||||
|
||||||||||||||
Credits
Reid Wightman of Dragos Inc.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41684",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:04:14.287350Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:04:20.683Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.49",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-EU",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-US-V",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Reid Wightman of Dragos Inc."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting)."
}
],
"value": "An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T08:23:28.046Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/de/advisories/VDE-2025-052"
}
],
"source": {
"advisory": "VDE-2025-052",
"defect": [
"CERT@VDE#641805"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Root Command Injection via Unsanitized Input in tls_iotgen_setting Endpoint",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41684",
"datePublished": "2025-07-23T08:23:28.046Z",
"dateReserved": "2025-04-16T11:17:48.309Z",
"dateUpdated": "2025-07-23T14:04:20.683Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41683 (GCVE-0-2025-41683)
Vulnerability from cvelistv5 – Published: 2025-07-23 08:22 – Updated: 2025-07-23 14:08
VLAI?
Title
Weidmueller: Root Command Injection via Unsanitized Input in event_mail_test Endpoint
Summary
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test).
Severity ?
8.8 (High)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SR-2TX-WL |
Affected:
V0.0 , < V1.49
(semver)
|
||||||||||||
|
||||||||||||||
Credits
Reid Wightman of Dragos Inc.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41683",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:08:26.152424Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:08:32.342Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.49",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-EU",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-US-V",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "V0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Reid Wightman of Dragos Inc."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test).\u003cbr\u003e"
}
],
"value": "An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T08:22:48.380Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/de/advisories/VDE-2025-052"
}
],
"source": {
"advisory": "VDE-2025-052",
"defect": [
"CERT@VDE#641805"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Root Command Injection via Unsanitized Input in event_mail_test Endpoint",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41683",
"datePublished": "2025-07-23T08:22:48.380Z",
"dateReserved": "2025-04-16T11:17:48.309Z",
"dateUpdated": "2025-07-23T14:08:32.342Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41663 (GCVE-0-2025-41663)
Vulnerability from cvelistv5 – Published: 2025-06-11 08:15 – Updated: 2025-07-24 14:32
VLAI?
Title
Weidmueller: Security routers IE-SR-2TX are affected by Command Injection
Summary
For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
Severity ?
9.8 (Critical)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SR-2TX-WL |
Affected:
0 , < V1.49
(semver)
|
||||||||||||
|
||||||||||||||
Credits
ONEKEY Research Labs
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41663",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-24T14:31:40.904178Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-24T14:32:41.460Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.49",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-EU",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-US-V",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "ONEKEY Research Labs"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.\u003cbr\u003e"
}
],
"value": "For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T08:22:16.504Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-052"
}
],
"source": {
"advisory": "VDE-2025-052",
"defect": [
"CERT@VDE#641805"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Security routers IE-SR-2TX are affected by Command Injection",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41663",
"datePublished": "2025-06-11T08:15:55.357Z",
"dateReserved": "2025-04-16T11:17:48.307Z",
"dateUpdated": "2025-07-24T14:32:41.460Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41661 (GCVE-0-2025-41661)
Vulnerability from cvelistv5 – Published: 2025-06-11 08:13 – Updated: 2025-07-24 14:33
VLAI?
Title
Weidmueller: Security routers IE-SR-2TX are affected by CSRF
Summary
An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection.
Severity ?
8.8 (High)
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SR-2TX-WL |
Affected:
0 , < V1.49
(semver)
|
||||||||||||
|
||||||||||||||
Credits
ONEKEY Research Labs
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41661",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-11T13:34:48.717671Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-24T14:33:16.906Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.49",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-EU",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SR-2TX-WL-4G-US-V",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "V1.62",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "ONEKEY Research Labs"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection."
}
],
"value": "An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-352",
"description": "CWE-352 Cross-Site Request Forgery (CSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T08:21:49.994Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-052"
}
],
"source": {
"advisory": "VDE-2025-052",
"defect": [
"CERT@VDE#641805"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Security routers IE-SR-2TX are affected by CSRF",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41661",
"datePublished": "2025-06-11T08:13:27.237Z",
"dateReserved": "2025-04-16T11:17:48.307Z",
"dateUpdated": "2025-07-24T14:33:16.906Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41662 (GCVE-0-2025-41662)
Vulnerability from cvelistv5 – Published: 2025-06-11 08:08 – Updated: 2025-07-23 07:53
VLAI?
CVE-2025-41662 is considered redundant or unnecessary and thus should be withdrawn. Instead, a new CVE CVE-2025-41687 has been reserved to better reflect the updated analysis.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2025-07-23T07:53:17.747Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"rejectedReasons": [
{
"lang": "en",
"value": "CVE-2025-41662 is considered redundant or unnecessary and thus should be withdrawn. Instead, a new CVE CVE-2025-41687 has been reserved to better reflect the updated analysis."
}
]
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41662",
"datePublished": "2025-06-11T08:08:17.544Z",
"dateRejected": "2025-07-23T07:53:17.747Z",
"dateReserved": "2025-04-16T11:17:48.307Z",
"dateUpdated": "2025-07-23T07:53:17.747Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41653 (GCVE-0-2025-41653)
Vulnerability from cvelistv5 – Published: 2025-05-27 08:38 – Updated: 2025-05-27 13:12
VLAI?
Title
Weidmueller: Denial-of-Service Vulnerability in the web server functionality of Industrial Ethernet Switches
Summary
An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive.
Severity ?
7.5 (High)
CWE
- CWE-410 - Insufficient Resource Pool
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SW-VL05M-5TX |
Affected:
0.0.0 , < 3.6.32
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41653",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T13:08:48.596317Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T13:12:39.961Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05M-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05MT-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-8TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-5TX-1SC-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SC",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2ST",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10M-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10MT-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16M-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16MT-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18M-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18MT-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
}
],
"value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-410",
"description": "CWE-410 Insufficient Resource Pool",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T08:38:29.005Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-044/"
}
],
"source": {
"advisory": "VDE-2025-044",
"defect": [
"CERT@VDE#641785"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Denial-of-Service Vulnerability in the web server functionality of Industrial Ethernet Switches",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41653",
"datePublished": "2025-05-27T08:38:29.005Z",
"dateReserved": "2025-04-16T11:17:48.306Z",
"dateUpdated": "2025-05-27T13:12:39.961Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41652 (GCVE-0-2025-41652)
Vulnerability from cvelistv5 – Published: 2025-05-27 08:38 – Updated: 2025-08-22 10:36
VLAI?
Title
Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches
Summary
The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Severity ?
9.8 (Critical)
CWE
- CWE-328 - Use of Weak Hash
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SW-VL05M-5TX |
Affected:
0.0.0 , < 3.6.32
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41652",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T13:14:16.971895Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T13:17:16.639Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05M-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05MT-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-8TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-5TX-1SC-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SC",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2ST",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10M-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10MT-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16M-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16MT-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18M-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18MT-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
}
],
"value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-328",
"description": "CWE-328 Use of Weak Hash",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-22T10:36:13.148Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-044/"
}
],
"source": {
"advisory": "VDE-2025-044",
"defect": [
"CERT@VDE#641785"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41652",
"datePublished": "2025-05-27T08:38:12.340Z",
"dateReserved": "2025-04-16T11:17:48.305Z",
"dateUpdated": "2025-08-22T10:36:13.148Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41651 (GCVE-0-2025-41651)
Vulnerability from cvelistv5 – Published: 2025-05-27 08:38 – Updated: 2025-05-27 13:26
VLAI?
Title
Weidmueller: Missing Authentication Vulnerability in Industrial Ethernet Switches
Summary
Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SW-VL05M-5TX |
Affected:
0.0.0 , < 3.6.32
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41651",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T13:24:17.307653Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T13:26:59.857Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05M-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05MT-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-8TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-5TX-1SC-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SC",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2ST",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10M-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10MT-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16M-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16MT-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18M-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18MT-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
}
],
"value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T08:38:03.213Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-044/"
}
],
"source": {
"advisory": "VDE-2025-044",
"defect": [
"CERT@VDE#641785"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Missing Authentication Vulnerability in Industrial Ethernet Switches",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41651",
"datePublished": "2025-05-27T08:38:03.213Z",
"dateReserved": "2025-04-16T11:17:48.305Z",
"dateUpdated": "2025-05-27T13:26:59.857Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41650 (GCVE-0-2025-41650)
Vulnerability from cvelistv5 – Published: 2025-05-27 08:37 – Updated: 2025-05-27 13:39
VLAI?
Title
Weidmueller: Denial-of-Service Vulnerability in Industrial Ethernet Switches
Summary
An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.
Severity ?
7.5 (High)
CWE
- CWE-1287 - Improper Validation of Specified Type of Input
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SW-VL05M-5TX |
Affected:
0.0.0 , < 3.6.32
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41650",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T13:37:42.461446Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T13:39:51.332Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05M-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05MT-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-8TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-5TX-1SC-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SC",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2ST",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10M-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10MT-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16M-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16MT-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18M-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18MT-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
}
],
"value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1287",
"description": "CWE-1287 Improper Validation of Specified Type of Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T08:37:44.635Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-044/"
}
],
"source": {
"advisory": "VDE-2025-044",
"defect": [
"CERT@VDE#641785"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Denial-of-Service Vulnerability in Industrial Ethernet Switches",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41650",
"datePublished": "2025-05-27T08:37:44.635Z",
"dateReserved": "2025-04-16T11:17:48.305Z",
"dateUpdated": "2025-05-27T13:39:51.332Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-41649 (GCVE-0-2025-41649)
Vulnerability from cvelistv5 – Published: 2025-05-27 08:37 – Updated: 2025-05-27 13:57
VLAI?
Title
Weidmueller: Out-of-Bounds Write Vulnerability in Industrial Ethernet Switches
Summary
An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.
Severity ?
7.5 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Weidmueller | IE-SW-VL05M-5TX |
Affected:
0.0.0 , < 3.6.32
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41649",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-27T13:50:43.784206Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T13:57:42.958Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05M-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL05MT-5TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.6.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-8TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-5TX-1SC-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SC",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2ST",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-VL08MT-6TX-2SCS",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.5.36",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10M-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL10MT-3GT-7TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.3.34",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16M-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL16MT-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.32",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18M-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IE-SW-PL18MT-2GC-16TX",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "3.4.40",
"status": "affected",
"version": "0.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
}
],
"value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-27T08:37:26.201Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-044/"
}
],
"source": {
"advisory": "VDE-2025-044",
"defect": [
"CERT@VDE#641785"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Out-of-Bounds Write Vulnerability in Industrial Ethernet Switches",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-41649",
"datePublished": "2025-05-27T08:37:26.201Z",
"dateReserved": "2025-04-16T11:17:48.305Z",
"dateUpdated": "2025-05-27T13:57:42.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-1393 (GCVE-0-2025-1393)
Vulnerability from cvelistv5 – Published: 2025-03-05 08:03 – Updated: 2025-03-05 14:29
VLAI?
Title
Weidmueller: Authentication Vulnerability due to Hard-coded Credentials
Summary
An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.
Severity ?
9.8 (Critical)
CWE
- CWE-798 - Use of Hard-coded Credentials
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Weidmueller | PROCON-WIN |
Affected:
0 , < 5.7.14.1
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-1393",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-05T14:28:54.515626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-05T14:29:03.639Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "PROCON-WIN",
"vendor": "Weidmueller",
"versions": [
{
"lessThan": "5.7.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-05T08:03:09.239Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/en/advisories/VDE-2025-021"
}
],
"source": {
"advisory": "VDE-2025-021",
"defect": [
"CERT@VDE#641750"
],
"discovery": "UNKNOWN"
},
"title": "Weidmueller: Authentication Vulnerability due to Hard-coded Credentials",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2025-1393",
"datePublished": "2025-03-05T08:03:09.239Z",
"dateReserved": "2025-02-17T10:11:56.475Z",
"dateUpdated": "2025-03-05T14:29:03.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-12525 (GCVE-0-2020-12525)
Vulnerability from cvelistv5 – Published: 2021-01-22 19:01 – Updated: 2024-09-16 23:11
VLAI?
Title
WAGO/M&M Software Deserialization of untrusted data in fdtCONTAINER component
Summary
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
Severity ?
7.3 (High)
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| M&M Software | fdtCONTAINER Component |
Affected:
unspecified , < 3.5
(custom)
Affected: 3.5 , < 3.5.20304.x (custom) Affected: 3.6 , < 3.6.20304.x (custom) |
||||||||||||||||||||||
|
||||||||||||||||||||||||
Credits
Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:52.074Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "fdtCONTAINER Component",
"vendor": "M\u0026M Software",
"versions": [
{
"lessThan": "3.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "3.5.20304.x",
"status": "affected",
"version": "3.5",
"versionType": "custom"
},
{
"lessThan": "3.6.20304.x",
"status": "affected",
"version": "3.6",
"versionType": "custom"
}
]
},
{
"product": "fdtCONTAINER Application",
"vendor": "M\u0026M Software",
"versions": [
{
"lessThan": "4.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "4.5.20304.x",
"status": "affected",
"version": "4.5",
"versionType": "custom"
},
{
"lessThan": "4.6.20304.x",
"status": "affected",
"version": "4.6",
"versionType": "custom"
}
]
},
{
"product": "dtmlINSPECTOR",
"vendor": "M\u0026M Software",
"versions": [
{
"status": "affected",
"version": "3"
}
]
},
{
"product": "PACTware",
"vendor": "Pepperl+Fuchs/PACTware",
"versions": [
{
"lessThanOrEqual": "5.0.5.31",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "WI Manager",
"vendor": "Weidm\u00fcller",
"versions": [
{
"lessThanOrEqual": "2.5.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE"
}
],
"datePublic": "2021-01-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "M\u0026M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-29T14:58:35",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
}
],
"solutions": [
{
"lang": "en",
"value": "M\u0026M Software provides two updated fdtCONTAINER component trees (3.6.20304.x \u003c 3.7 and \u003e= 3.7) see advisory https://cert.vde.com/en-us/advisories/vde-2020-048 for details."
}
],
"source": {
"advisory": "VDE-2020-048",
"defect": [
"VDE-2020-048"
],
"discovery": "EXTERNAL"
},
"title": "WAGO/M\u0026M Software Deserialization of untrusted data in fdtCONTAINER component",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-01-14T11:00:00.000Z",
"ID": "CVE-2020-12525",
"STATE": "PUBLIC",
"TITLE": "WAGO/M\u0026M Software Deserialization of untrusted data in fdtCONTAINER component"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "fdtCONTAINER Component",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "3.5"
},
{
"version_affected": "\u003c",
"version_name": "3.5",
"version_value": "3.5.20304.x"
},
{
"version_affected": "\u003c",
"version_name": "3.6",
"version_value": "3.6.20304.x"
}
]
}
},
{
"product_name": "fdtCONTAINER Application",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "4.5"
},
{
"version_affected": "\u003c",
"version_name": "4.5",
"version_value": "4.5.20304.x"
},
{
"version_affected": "\u003c",
"version_name": "4.6",
"version_value": "4.6.20304.x"
}
]
}
},
{
"product_name": "dtmlINSPECTOR",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3"
}
]
}
}
]
},
"vendor_name": "M\u0026M Software"
},
{
"product": {
"product_data": [
{
"product_name": "PACTware",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "5.0.5.31"
}
]
}
}
]
},
"vendor_name": "Pepperl+Fuchs/PACTware"
},
{
"product": {
"product_data": [
{
"product_name": "WI Manager",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "2.5.1"
}
]
}
}
]
},
"vendor_name": "Weidm\u00fcller"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "M\u0026M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-502 Deserialization of Untrusted Data"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2020-038",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
},
{
"name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05",
"refsource": "MISC",
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
}
]
},
"solution": [
{
"lang": "en",
"value": "M\u0026M Software provides two updated fdtCONTAINER component trees (3.6.20304.x \u003c 3.7 and \u003e= 3.7) see advisory https://cert.vde.com/en-us/advisories/vde-2020-048 for details."
}
],
"source": {
"advisory": "VDE-2020-048",
"defect": [
"VDE-2020-048"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2020-12525",
"datePublished": "2021-01-22T19:01:56.886079Z",
"dateReserved": "2020-04-30T00:00:00",
"dateUpdated": "2024-09-16T23:11:43.568Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}