A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00157}

epss

{'score': 0.00176}


Tue, 08 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 07:15:00 +0000

Type Values Removed Values Added
Description A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
Title Phoenix Contact: File access due to the replacement of a critical file used by the watchdog
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-07-08T07:03:38.410Z

Updated: 2025-07-08T14:28:36.584Z

Reserved: 2025-04-16T11:17:48.307Z

Link: CVE-2025-41666

cve-icon Vulnrichment

Updated: 2025-07-08T14:23:30.348Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-08T07:15:25.630

Modified: 2025-07-08T16:18:14.207

Link: CVE-2025-41666

cve-icon Redhat

No data.