The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Viessmann
Viessmann vitogate 300 |
|
Vendors & Products |
Viessmann
Viessmann vitogate 300 |
Tue, 23 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 23 Sep 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device. | |
Title | Viessmann Vitogate 300 Authentication Bypass | |
Weaknesses | CWE-602 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Carrier
Published: 2025-09-23T01:16:53.619Z
Updated: 2025-09-23T13:33:47.319Z
Reserved: 2025-08-26T17:40:58.043Z
Link: CVE-2025-9495

Updated: 2025-09-23T13:33:44.366Z

Status : Awaiting Analysis
Published: 2025-09-23T02:15:47.563
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-9495

No data.