The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
History

Tue, 23 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Viessmann
Viessmann vitogate 300
Vendors & Products Viessmann
Viessmann vitogate 300

Tue, 23 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 01:45:00 +0000

Type Values Removed Values Added
Description The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
Title Viessmann Vitogate 300 Authentication Bypass
Weaknesses CWE-602
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published: 2025-09-23T01:16:53.619Z

Updated: 2025-09-23T13:33:47.319Z

Reserved: 2025-08-26T17:40:58.043Z

Link: CVE-2025-9495

cve-icon Vulnrichment

Updated: 2025-09-23T13:33:44.366Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-23T02:15:47.563

Modified: 2025-09-24T18:11:24.520

Link: CVE-2025-9495

cve-icon Redhat

No data.