CVE-2025-3606 (GCVE-0-2025-3606)

Vulnerability from cvelistv5 – Published: 2025-04-24 23:15 – Updated: 2025-04-25 16:02
VLAI?
Summary
Vestel AC Charger version 3.75.0 contains a vulnerability that could enable an attacker to access files containing sensitive information, such as credentials which could be used to further compromise the device.
CWE
Assigner
Impacted products
Vendor Product Version
Vestel AC Charger EVC04 Affected: 3.75.0
Create a notification for this product.
Credits
Cumhur Kizilari reported this vulnerability to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-3606",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-25T15:37:27.258163Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-25T16:02:38.056Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "AC Charger EVC04",
          "vendor": "Vestel",
          "versions": [
            {
              "status": "affected",
              "version": "3.75.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Cumhur Kizilari reported this vulnerability to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vestel AC Charger \nversion \n\n3.75.0 contains a vulnerability that \ncould enable an attacker to access files containing sensitive \ninformation, such as credentials which could be used to further \ncompromise the device."
            }
          ],
          "value": "Vestel AC Charger \nversion \n\n3.75.0 contains a vulnerability that \ncould enable an attacker to access files containing sensitive \ninformation, such as credentials which could be used to further \ncompromise the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-497",
              "description": "CWE-497",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-24T23:15:52.975Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03"
        },
        {
          "url": "https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media\u0026token=8201f299-5014-4720-9200-f1b335736ac1"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vestel strongly suggests that users of the related AC chargers update to version V3.187 or a higher version.\u003cbr\u003e"
            }
          ],
          "value": "Vestel strongly suggests that users of the related AC chargers update to version V3.187 or a higher version."
        }
      ],
      "source": {
        "advisory": "ICSA-25-114-03",
        "discovery": "EXTERNAL"
      },
      "title": "Vestel AC Charger Exposure of Sensitive System Information to an Unauthorized Control Sphere",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAvoid using open network:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUse secure methods like virtual private networks (VPNs) for remote \naccess. Regularly update VPNs to their latest versions and ensure that \nconnected devices maintain strong security measures.\u003c/li\u003e\n\u003cli\u003eReduce network exposure for applications and endpoints. Only make \nthem accessible via the Internet if specifically designed for and \nrequired by their intended use.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eLogin Credentials Management:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eForce end user to revise the factory default set username and password of webconfig page.\u003c/li\u003e\n\u003cli\u003eRemove any printed documents such as installation guide, instruction\n book, quick start guide from web where login credentials are featured.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003ePlease refer to Vestel\u0027s \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media\u0026amp;token=8201f299-5014-4720-9200-f1b335736ac1\"\u003eadvisory\u003c/a\u003e for more information.\n\n\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "Avoid using open network:\n\n\n\n  *  Use secure methods like virtual private networks (VPNs) for remote \naccess. Regularly update VPNs to their latest versions and ensure that \nconnected devices maintain strong security measures.\n\n  *  Reduce network exposure for applications and endpoints. Only make \nthem accessible via the Internet if specifically designed for and \nrequired by their intended use.\n\n\n\n\nLogin Credentials Management:\n\n\n\n  *  Force end user to revise the factory default set username and password of webconfig page.\n\n  *  Remove any printed documents such as installation guide, instruction\n book, quick start guide from web where login credentials are featured.\n\n\n\n\nPlease refer to Vestel\u0027s  advisory https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf  for more information."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2025-3606",
    "datePublished": "2025-04-24T23:15:52.975Z",
    "dateReserved": "2025-04-14T19:44:14.176Z",
    "dateUpdated": "2025-04-25T16:02:38.056Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-3606\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2025-04-25T00:15:15.807\",\"lastModified\":\"2025-04-29T13:52:28.490\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vestel AC Charger \\nversion \\n\\n3.75.0 contains a vulnerability that \\ncould enable an attacker to access files containing sensitive \\ninformation, such as credentials which could be used to further \\ncompromise the device.\"},{\"lang\":\"es\",\"value\":\"Vestel AC Charger versi\u00f3n 3.75.0 contiene una vulnerabilidad que podr\u00eda permitir a un atacante acceder a archivos que contienen informaci\u00f3n confidencial, como credenciales que podr\u00edan usarse para comprometer a\u00fan m\u00e1s el dispositivo.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-497\"}]}],\"references\":[{\"url\":\"https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media\u0026token=8201f299-5014-4720-9200-f1b335736ac1\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03\",\"source\":\"ics-cert@hq.dhs.gov\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-3606\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-25T15:37:27.258163Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-25T15:37:28.871Z\"}}], \"cna\": {\"title\": \"Vestel AC Charger Exposure of Sensitive System Information to an Unauthorized Control Sphere\", \"source\": {\"advisory\": \"ICSA-25-114-03\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Cumhur Kizilari reported this vulnerability to CISA.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Vestel\", \"product\": \"AC Charger EVC04\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.75.0\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Vestel strongly suggests that users of the related AC chargers update to version V3.187 or a higher version.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Vestel strongly suggests that users of the related AC chargers update to version V3.187 or a higher version.\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-03\"}, {\"url\": \"https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media\u0026token=8201f299-5014-4720-9200-f1b335736ac1\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Avoid using open network:\\n\\n\\n\\n  *  Use secure methods like virtual private networks (VPNs) for remote \\naccess. Regularly update VPNs to their latest versions and ensure that \\nconnected devices maintain strong security measures.\\n\\n  *  Reduce network exposure for applications and endpoints. Only make \\nthem accessible via the Internet if specifically designed for and \\nrequired by their intended use.\\n\\n\\n\\n\\nLogin Credentials Management:\\n\\n\\n\\n  *  Force end user to revise the factory default set username and password of webconfig page.\\n\\n  *  Remove any printed documents such as installation guide, instruction\\n book, quick start guide from web where login credentials are featured.\\n\\n\\n\\n\\nPlease refer to Vestel\u0027s  advisory https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf  for more information.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAvoid using open network:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eUse secure methods like virtual private networks (VPNs) for remote \\naccess. Regularly update VPNs to their latest versions and ensure that \\nconnected devices maintain strong security measures.\u003c/li\u003e\\n\u003cli\u003eReduce network exposure for applications and endpoints. Only make \\nthem accessible via the Internet if specifically designed for and \\nrequired by their intended use.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eLogin Credentials Management:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003eForce end user to revise the factory default set username and password of webconfig page.\u003c/li\u003e\\n\u003cli\u003eRemove any printed documents such as installation guide, instruction\\n book, quick start guide from web where login credentials are featured.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003ePlease refer to Vestel\u0027s \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://firebasestorage.googleapis.com/v0/b/vestel-shield.firebasestorage.app/o/PRODUCTION%2F1%2FVSA-1_R2.pdf?alt=media\u0026amp;token=8201f299-5014-4720-9200-f1b335736ac1\\\"\u003eadvisory\u003c/a\u003e for more information.\\n\\n\u003cbr\u003e\u003c/p\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vestel AC Charger \\nversion \\n\\n3.75.0 contains a vulnerability that \\ncould enable an attacker to access files containing sensitive \\ninformation, such as credentials which could be used to further \\ncompromise the device.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Vestel AC Charger \\nversion \\n\\n3.75.0 contains a vulnerability that \\ncould enable an attacker to access files containing sensitive \\ninformation, such as credentials which could be used to further \\ncompromise the device.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-497\", \"description\": \"CWE-497\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2025-04-24T23:15:52.975Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-3606\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-25T16:02:38.056Z\", \"dateReserved\": \"2025-04-14T19:44:14.176Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2025-04-24T23:15:52.975Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…