The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sauter
Sauter ey-modulo 5 Devices Sauter modulo 6 Devices |
|
| Vendors & Products |
Sauter
Sauter ey-modulo 5 Devices Sauter modulo 6 Devices |
Wed, 22 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices. | |
| Title | Sauter: Hard-coded Authentication Credentials | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-10-22T06:58:31.679Z
Updated: 2025-10-22T13:30:10.827Z
Reserved: 2025-04-16T11:17:48.317Z
Link: CVE-2025-41722
Updated: 2025-10-22T13:30:01.031Z
Status : Awaiting Analysis
Published: 2025-10-22T07:15:33.640
Modified: 2025-10-22T21:12:48.953
Link: CVE-2025-41722
No data.