CVE-2025-41690
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-02

Last updated on: 2025-09-02

Assigner: CERT VDE

Description
A low-privileged attacker in bluetooth range may be able to access the password of a higher-privilege user (Maintenance) by viewing the device’s event log. This vulnerability could allow the Operator to authenticate as the Maintenance user, thereby gaining unauthorized access to sensitive configuration settings and the ability to modify device parameters.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-02
Last Modified
2025-09-02
Generated
2026-05-07
AI Q&A
2025-09-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
endress_hauser proline 10
endress_hauser promag 10
endress_hauser promass 10
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-532 The product writes sensitive information to a log file.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows a low-privileged attacker within Bluetooth range to access the password of a higher-privilege Maintenance user by viewing the device's event log, which improperly logs sensitive information. This enables the attacker, who initially has Operator-level access, to escalate privileges to Maintenance-level, gaining unauthorized access to sensitive device functions and settings. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can modify all Maintenance parameters, change device settings, initiate device resets causing downtime, restore factory defaults, reconfigure diagnostic parameters, disable Bluetooth communication, and alter the 4–20 mA analog output range. This can lead to unauthorized control over the device, potential operational disruptions, and compromise of device integrity and availability. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking the device's event log for exposure of the Maintenance user's password, as the vulnerability stems from sensitive information being logged improperly. Since the issue occurs on Endress+Hauser Proline 10 devices within Bluetooth range, monitoring Bluetooth connections and reviewing event logs on affected devices can help detect exploitation attempts. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the device firmware to versions 01.00.06 (HART/Modbus) or 01.00.02 (IO-Link) or later, as released by Endress+Hauser. Additionally, disabling Bluetooth communication when not in use reduces the risk of exploitation. Customers should contact Endress+Hauser service centers for assistance with updates. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart