CVE-2025-25265
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-16

Last updated on: 2025-11-21

Assigner: CERT VDE

Description
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system’s file structure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2025-11-21
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of the vulnerable web application endpoint that allows unauthenticated file reading. You can use tools like curl or wget to send HTTP requests to the specific path of the web application and attempt to read files without authentication. For example, using curl: curl http://<device-ip>/<vulnerable-endpoint>?file=/etc/passwd to see if the file contents are returned. Network scanning tools can also be used to identify devices running affected firmware versions below 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2). [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the device firmware to version 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2) or later. If you are using custom firmware versions, contact WAGO support for guidance. Applying these updates will fix the unauthenticated file read vulnerability and related issues. Additionally, restrict network access to the affected devices and monitor for suspicious activity until the update can be applied. [1]


Can you explain this vulnerability to me?

This vulnerability exists in a web application used to configure a controller. It includes an endpoint that allows an unauthenticated remote attacker to read files from the system's file structure without any authentication. This means an attacker can access sensitive files on the device remotely without needing credentials. [1]


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to sensitive system files, resulting in data leakage. Attackers can remotely exploit this flaw to extract sensitive information, perform malicious actions, and potentially discover further security weaknesses. This can compromise the integrity of the device and lead to security incidents such as data breaches. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart