CVE-2025-25265
BaseFortify
Publication date: 2025-06-16
Last updated on: 2025-11-21
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable web application endpoint that allows unauthenticated file reading. You can use tools like curl or wget to send HTTP requests to the specific path of the web application and attempt to read files without authentication. For example, using curl: curl http://<device-ip>/<vulnerable-endpoint>?file=/etc/passwd to see if the file contents are returned. Network scanning tools can also be used to identify devices running affected firmware versions below 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2). [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the device firmware to version 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2) or later. If you are using custom firmware versions, contact WAGO support for guidance. Applying these updates will fix the unauthenticated file read vulnerability and related issues. Additionally, restrict network access to the affected devices and monitor for suspicious activity until the update can be applied. [1]
Can you explain this vulnerability to me?
This vulnerability exists in a web application used to configure a controller. It includes an endpoint that allows an unauthenticated remote attacker to read files from the system's file structure without any authentication. This means an attacker can access sensitive files on the device remotely without needing credentials. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive system files, resulting in data leakage. Attackers can remotely exploit this flaw to extract sensitive information, perform malicious actions, and potentially discover further security weaknesses. This can compromise the integrity of the device and lead to security incidents such as data breaches. [1]