Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Jun 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 |
Tue, 24 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 24 Jun 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks. | |
Title | Modbus Command Injection without Authentication | |
References |
|

Status: PUBLISHED
Assigner: CSA
Published: 2025-06-24T02:12:41.743Z
Updated: 2025-06-25T12:59:38.016Z
Reserved: 2025-05-22T09:41:25.402Z
Link: CVE-2025-48466

Updated: 2025-06-24T15:25:34.906Z

Status : Awaiting Analysis
Published: 2025-06-24T03:15:34.013
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-48466

No data.