Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks.
History

Wed, 25 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-863

Tue, 24 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Tue, 24 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks.
Title Modbus Command Injection without Authentication
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CSA

Published: 2025-06-24T02:12:41.743Z

Updated: 2025-06-25T12:59:38.016Z

Reserved: 2025-05-22T09:41:25.402Z

Link: CVE-2025-48466

cve-icon Vulnrichment

Updated: 2025-06-24T15:25:34.906Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-24T03:15:34.013

Modified: 2025-06-26T18:58:14.280

Link: CVE-2025-48466

cve-icon Redhat

No data.