CVE-2025-34081
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-01

Last updated on: 2025-11-04

Assigner: VulnCheck

Description
The Contec Co.,Ltd. CONPROSYS HMI System (CHS) exposes a PHP phpinfo() debug page to unauthenticated users that may contain sensitive data useful for an attacker.This issue affects CONPROSYS HMI System (CHS): before 3.7.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-01
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
contec conprosys_hmi_system to 3.7.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-215 The product inserts sensitive information into debugging code, which could expose this information if the debugging code is not disabled in production.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the Contec Co.,Ltd. CONPROSYS HMI System (CHS) exposing a PHP phpinfo() debug page to unauthenticated users. This debug page may contain sensitive information that could be useful to an attacker. The issue affects versions of CONPROSYS HMI System (CHS) before 3.7.7.


How can this vulnerability impact me? :

The exposure of the phpinfo() debug page to unauthenticated users can lead to the disclosure of sensitive system information, which attackers could use to identify weaknesses or plan further attacks. This could compromise system security and potentially lead to unauthorized access or data breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if the CONPROSYS HMI System (CHS) exposes a phpinfo() debug page accessible without authentication. For example, you can use a command like: curl -I http://<target-ip-or-host>/path_to_phpinfo_page.php to see if the page is accessible and returns sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the phpinfo() debug page by removing or disabling it in the CONPROSYS HMI System (CHS) before version 3.7.7, or applying access controls to prevent unauthenticated users from accessing it. Upgrading the system to version 3.7.7 or later, where this issue is fixed, is also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart