CVE-2025-41697
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| phoenix_contact | fl_switch | 3.50 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1299 | The lack of protections on alternate paths to access control-protected assets (such as unprotected shadow registers and other external facing unguarded interfaces) allows an attacker to bypass existing protections to the asset that are only performed against the primary path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves an undocumented UART port on the device's PCB that an attacker can exploit as a side-channel to gain root access, for example by using credentials obtained from a related vulnerability (CVE-2025-41692).
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can gain root access to the device, potentially leading to full control over the system, compromising confidentiality, integrity, and availability of data and services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should update the firmware of affected Phoenix Contact FL SWITCH 2xxx series devices to version 3.50 or later, as this version resolves CVE-2025-41692 and related vulnerabilities. Since CVE-2025-41697 involves an undocumented UART port used as a side-channel for root access, physical security measures to restrict access to the device's PCB and UART ports should also be implemented to prevent exploitation. [1]