The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
History

Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 May 2025 08:45:00 +0000

Type Values Removed Values Added
Description The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Title Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches
Weaknesses CWE-656
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-05-27T08:38:12.340Z

Updated: 2025-05-27T13:17:16.639Z

Reserved: 2025-04-16T11:17:48.305Z

Link: CVE-2025-41652

cve-icon Vulnrichment

Updated: 2025-05-27T13:16:59.009Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-27T09:15:21.720

Modified: 2025-05-28T15:01:30.720

Link: CVE-2025-41652

cve-icon Redhat

No data.