Refine your search

2 vulnerabilities found for edgeConnector by Softing

CVE-2025-7390 (GCVE-0-2025-7390)
Vulnerability from cvelistv5
Published
2025-08-21 06:08
Modified
2026-03-27 08:36
Severity ?
CWE
  • CWE-295 - Improper Certificate Validation
Summary
A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
Impacted products
Vendor Product Version
Softing OPC UA C++ SDK Version: 6.40   <
Patch: 6.80.1
Create a notification for this product.
   Softing edgeConnector Version: 0   <
Patch: SDEX Suite V1.0
Create a notification for this product.
   Softing edgeAggregator Version: 0   <
Patch: SDEX Suite V1.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7390",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-21T13:51:51.306799Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-21T13:53:15.381Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://industrial.softing.com/products/opc-ua-and-opc-classic-sdks/opc-ua-c-sdks-for-windows.html",
          "defaultStatus": "unaffected",
          "modules": [
            "opc.https server"
          ],
          "platforms": [
            "Windows",
            "Linux",
            "VxWorks"
          ],
          "product": "OPC UA C++ SDK",
          "vendor": "Softing",
          "versions": [
            {
              "lessThanOrEqual": "6.80",
              "status": "affected",
              "version": "6.40",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "6.80.1",
              "versionType": "custom"
            }
          ]
        },
        {
          "collectionURL": "https://industrial.softing.com/de/produkte/docker-container/edgeconnector.html",
          "defaultStatus": "affected",
          "platforms": [
            "Linux"
          ],
          "product": "edgeConnector",
          "vendor": "Softing",
          "versions": [
            {
              "lessThanOrEqual": "2025.03",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "SDEX Suite V1.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "collectionURL": "https://industrial.softing.com/de/produkte/docker-container/edgeaggregator.html",
          "defaultStatus": "affected",
          "platforms": [
            "Linux"
          ],
          "product": "edgeAggregator",
          "vendor": "Softing",
          "versions": [
            {
              "lessThanOrEqual": "2025.03",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "SDEX Suite V1.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:*:*:windows:*:*:*:*:*",
                  "versionEndIncluding": "6.80",
                  "versionStartIncluding": "6.40",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "6.80",
                  "versionStartIncluding": "6.40",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:*:*:vxworks:*:*:*:*:*",
                  "versionEndIncluding": "6.80",
                  "versionStartIncluding": "6.40",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:6.80.1:*:windows:*:*:*:*:*",
                  "vulnerable": false
                },
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:6.80.1:*:linux:*:*:*:*:*",
                  "vulnerable": false
                },
                {
                  "criteria": "cpe:2.3:a:softing:opc_ua_c_sdk:6.80.1:*:vxworks:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:softing:edgeconnector:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "2025.03",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:softing:edgeconnector:sdex_suite_v1.0:*:linux:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            },
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:softing:edgeaggregator:*:*:linux:*:*:*:*:*",
                  "versionEndIncluding": "2025.03",
                  "versionStartIncluding": "0",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:a:softing:edgeaggregator:sdex_suite_v1.0:*:linux:*:*:*:*:*",
                  "vulnerable": false
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "datePublic": "2025-08-14T06:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication."
            }
          ],
          "value": "A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-27T08:36:30.497Z",
        "orgId": "10de8ef9-5c89-4b17-8228-e97b74acf4bd",
        "shortName": "Softing"
      },
      "references": [
        {
          "url": "https://industrial.softing.com/fileadmin/psirt/downloads/2025/CVE-2025-7390.html"
        },
        {
          "url": "https://industrial.softing.com/fileadmin/psirt/downloads/2025/CVE-2025-7390.json"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "OPC UA C++ SDK V6.80.1 Service-Patch\u003cbr\u003e"
            }
          ],
          "value": "OPC UA C++ SDK V6.80.1 Service-Patch"
        },
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "edgeAggregator \u0026amp; edgeConnector are now integrated in SDEX Suite: fix with V1.0"
            }
          ],
          "value": "edgeAggregator \u0026 edgeConnector are now integrated in SDEX Suite: fix with V1.0"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Bypass the client certificate trust check of an opc.https server while only secure communication is allowed",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "10de8ef9-5c89-4b17-8228-e97b74acf4bd",
    "assignerShortName": "Softing",
    "cveId": "CVE-2025-7390",
    "datePublished": "2025-08-21T06:08:00.210Z",
    "dateReserved": "2025-07-09T13:09:38.988Z",
    "dateUpdated": "2026-03-27T08:36:30.497Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2024-0860 (GCVE-0-2024-0860)
Vulnerability from cvelistv5
Published
2024-03-14 20:54
Modified
2024-08-12 20:30
CWE
  • CWE-319 - Cleartext Transmission of Sensitive Information
Summary
The affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker to capture packets to craft their own requests.
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:18:18.751Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-13"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:softing:edgeconnector:3.60:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "edgeconnector",
            "vendor": "softing",
            "versions": [
              {
                "status": "affected",
                "version": "3.60"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:softing:edgeaggregator:3.60:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "edgeaggregator",
            "vendor": "softing",
            "versions": [
              {
                "status": "affected",
                "version": "3.60"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-0860",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-15T16:34:23.355296Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-12T20:30:17.682Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "edgeConnector",
          "vendor": "Softing",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.60"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "edgeAggregator",
          "vendor": "Softing",
          "versions": [
            {
              "status": "affected",
              "version": "Version 3.60"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pan ZhenPeng (@Peterpan0927) and Li JianTao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg) working with Trend Micro Zero Day Initiative reported these vulnerabilities to CISA. Claroty Team82 working with Trend Micro Zero Day Initiative reported these vulnerabilities to CISA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cp\u003eThe affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker to capture packets to craft their own requests.\u003c/p\u003e\u003cbr\u003e\n\n"
            }
          ],
          "value": "\nThe affected product is vulnerable to a cleartext transmission of sensitive information vulnerability, which may allow an attacker to capture packets to craft their own requests.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-319",
              "description": "CWE-319 Cleartext Transmission of Sensitive Information",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-14T20:54:56.710Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-13"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eUpdate Softing edgeConnector and edgeAggregator to v3.70 or greater.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "\nUpdate Softing edgeConnector and edgeAggregator to v3.70 or greater.\n"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Cleartext Transmission of Sensitive Information in Softing edgeConnector and edgeAggregator",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-0860",
    "datePublished": "2024-03-14T20:54:56.710Z",
    "dateReserved": "2024-01-24T15:13:18.203Z",
    "dateUpdated": "2024-08-12T20:30:17.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}