Vulnerabilites related to Weidmueller - IE-SW-VL08MT-8TX
CVE-2025-41650 (GCVE-0-2025-41650)
Vulnerability from cvelistv5
Published
2025-05-27 08:37
Modified
2025-05-27 13:39
CWE
  • CWE-1287 - Improper Validation of Specified Type of Input
Summary
An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:37:42.461446Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:39:51.332Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1287",
              "description": "CWE-1287 Improper Validation of Specified Type of Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:37:44.635Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Denial-of-Service Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41650",
    "datePublished": "2025-05-27T08:37:44.635Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:39:51.332Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41653 (GCVE-0-2025-41653)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-05-27 13:12
CWE
  • CWE-410 - Insufficient Resource Pool
Summary
An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41653",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:08:48.596317Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:12:39.961Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device\u0027s web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-410",
              "description": "CWE-410 Insufficient Resource Pool",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:38:29.005Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Denial-of-Service Vulnerability in the web server functionality of Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41653",
    "datePublished": "2025-05-27T08:38:29.005Z",
    "dateReserved": "2025-04-16T11:17:48.306Z",
    "dateUpdated": "2025-05-27T13:12:39.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41651 (GCVE-0-2025-41651)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-05-27 13:26
Severity ?
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41651",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:24:17.307653Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:26:59.857Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
            }
          ],
          "value": "Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:38:03.213Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Missing Authentication Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41651",
    "datePublished": "2025-05-27T08:38:03.213Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:26:59.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41652 (GCVE-0-2025-41652)
Vulnerability from cvelistv5
Published
2025-05-27 08:38
Modified
2025-08-22 10:36
Severity ?
CWE
Summary
The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41652",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:14:16.971895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:17:16.639Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
            }
          ],
          "value": "The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-328",
              "description": "CWE-328 Use of Weak Hash",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-22T10:36:13.148Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41652",
    "datePublished": "2025-05-27T08:38:12.340Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-08-22T10:36:13.148Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41649 (GCVE-0-2025-41649)
Vulnerability from cvelistv5
Published
2025-05-27 08:37
Modified
2025-05-27 13:57
CWE
Summary
An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41649",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-27T13:50:43.784206Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-27T13:57:42.958Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05M-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL05MT-5TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.6.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-8TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-5TX-1SC-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SC",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2ST",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-VL08MT-6TX-2SCS",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.5.36",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10M-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL10MT-3GT-7TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.3.34",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16M-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL16MT-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.32",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18M-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "IE-SW-PL18MT-2GC-16TX",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThan": "3.4.40",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
            }
          ],
          "value": "An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-27T08:37:26.201Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-044",
        "defect": [
          "CERT@VDE#641785"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Weidmueller: Out-of-Bounds Write Vulnerability in Industrial Ethernet Switches",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41649",
    "datePublished": "2025-05-27T08:37:26.201Z",
    "dateReserved": "2025-04-16T11:17:48.305Z",
    "dateUpdated": "2025-05-27T13:57:42.958Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}