JVNDB-2025-007754

Vulnerability from jvndb - Published: 2025-07-02 11:31 - Updated:2025-07-02 11:31
Severity ?
Summary
Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS)
Details
CONPROSYS HMI System (CHS) provided by Contec Co.,Ltd. contains multiple vulnerabilities listed below. * Reflected cross-site scripting (CWE-79) - CVE-2025-34080 * Insertion of sensitive information into debugging code (CWE-215) - CVE-2025-34081 Alex Williams of Converge Technology Solutions reported these vulnerabilities to Vulncheck Inc., and Vulncheck Inc. reported these vulnerabilities to the developer. Based on the coordination request made by the developer, JPCERT/CC coordinated with Vulncheck Inc. and the developer.
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-007754.html",
  "dc:date": "2025-07-02T11:31+09:00",
  "dcterms:issued": "2025-07-02T11:31+09:00",
  "dcterms:modified": "2025-07-02T11:31+09:00",
  "description": "CONPROSYS HMI System (CHS) provided by Contec Co.,Ltd. contains multiple vulnerabilities listed below.\r\n\r\n  * Reflected cross-site scripting (CWE-79) - CVE-2025-34080\r\n  * Insertion of sensitive information into debugging code (CWE-215) - CVE-2025-34081\r\n\r\nAlex Williams of Converge Technology Solutions reported these vulnerabilities to Vulncheck Inc., and\r\nVulncheck Inc. reported these vulnerabilities to the developer.\r\nBased on the coordination request made by the developer, JPCERT/CC coordinated with Vulncheck Inc. and the developer.",
  "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-007754.html",
  "sec:cpe": {
    "#text": "cpe:/a:contec:conprosys_hmi_system",
    "@product": "CONPROSYS HMI System (CHS)",
    "@vendor": "Contec",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "6.1",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2025-007754",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU92266386/index.html",
      "@id": "JVNVU#92266386",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-34080",
      "@id": "CVE-2025-34080",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-34081",
      "@id": "CVE-2025-34081",
      "@source": "CVE"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/215.html",
      "@id": "CWE-215",
      "@title": "Insertion of Sensitive Information Into Debugging Code(CWE-215)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…