The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
History

Fri, 22 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-656

Fri, 22 Aug 2025 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-328

Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 May 2025 08:45:00 +0000

Type Values Removed Values Added
Description The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Title Weidmueller: Authentication Bypass Vulnerability in Industrial Ethernet Switches
Weaknesses CWE-656
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-05-27T08:38:12.340Z

Updated: 2025-08-22T10:36:13.148Z

Reserved: 2025-04-16T11:17:48.305Z

Link: CVE-2025-41652

cve-icon Vulnrichment

Updated: 2025-05-27T13:16:59.009Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-27T09:15:21.720

Modified: 2025-08-22T11:15:31.247

Link: CVE-2025-41652

cve-icon Redhat

No data.