CVE-2025-41704
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-11-03
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| phoenix_contact | quint4_ups | From vc (inc) to 07 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 00 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 04 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 01 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 06 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 02 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 05 (inc) |
| phoenix_contact | quint4_ups | From vc (inc) to 03 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-770 | The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-41704 is a vulnerability where an unauthenticated remote attacker can cause a denial of service (DoS) on the Modbus service by sending a specific function and sub-function code. This attack disrupts the availability of the Modbus service but does not affect the core functionality of the device.
How can this vulnerability impact me? :
This vulnerability can impact you by causing a denial of service (DoS) on the Modbus service of affected devices, potentially disrupting industrial or control system operations that rely on Modbus communication. However, it does not compromise the confidentiality or integrity of the device or its core functions.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include deploying the affected devices only within closed industrial networks protected by appropriate firewalls and applying firmware updates starting from version VC:07, which address this vulnerability along with related CVEs. Note that even with VC:07, some unauthenticated Modbus/TCP configuration vulnerabilities remain, so network isolation and firewall protections are critical. [1]