CVE-2025-41722
BaseFortify
Publication date: 2025-10-22
Last updated on: 2025-10-22
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sauter | modulo_6 | * |
| sauter | case_suite | 5.2_sr5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized extraction of private keys, which compromises the security of the affected devices. This can allow attackers to impersonate legitimate services or decrypt sensitive communications, potentially leading to data breaches or other security incidents.
Can you explain this vulnerability to me?
This vulnerability involves the wsc server using a hard-coded certificate to verify the authenticity of SOAP messages. Because of this, an unauthenticated remote attacker can exploit the system to extract private keys from the affected devices' software.