CVE-2025-41704
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-11-03

Assigner: CERT VDE

Description
An unauthanticated remote attacker can perform a DoS of the Modbus service by sending a specific function and sub-function code without affecting the core functionality.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 8 associated CPEs
Vendor Product Version / Range
phoenix_contact quint4_ups From vc (inc) to 07 (inc)
phoenix_contact quint4_ups From vc (inc) to 00 (inc)
phoenix_contact quint4_ups From vc (inc) to 04 (inc)
phoenix_contact quint4_ups From vc (inc) to 01 (inc)
phoenix_contact quint4_ups From vc (inc) to 06 (inc)
phoenix_contact quint4_ups From vc (inc) to 02 (inc)
phoenix_contact quint4_ups From vc (inc) to 05 (inc)
phoenix_contact quint4_ups From vc (inc) to 03 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-41704 is a vulnerability where an unauthenticated remote attacker can cause a denial of service (DoS) on the Modbus service by sending a specific function and sub-function code. This attack disrupts the availability of the Modbus service but does not affect the core functionality of the device.


How can this vulnerability impact me? :

This vulnerability can impact you by causing a denial of service (DoS) on the Modbus service of affected devices, potentially disrupting industrial or control system operations that rely on Modbus communication. However, it does not compromise the confidentiality or integrity of the device or its core functions.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include deploying the affected devices only within closed industrial networks protected by appropriate firewalls and applying firmware updates starting from version VC:07, which address this vulnerability along with related CVEs. Note that even with VC:07, some unauthenticated Modbus/TCP configuration vulnerabilities remain, so network isolation and firewall protections are critical. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart