CVE-2025-41743
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-02

Last updated on: 2026-02-23

Assigner: CERT VDE

Description
Insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 allows a local unprivileged attacker to extract data from update images and thus obtain limited information about the architecture and internal processes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-02
Last Modified
2026-02-23
Generated
2026-05-07
AI Q&A
2025-12-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
sprecher-automation sprecon-e-c_firmware to 9.0 (exc)
sprecher-automation sprecon-e-p_firmware to 9.0 (exc)
sprecher-automation sprecon-e-t3_firmware to 9.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-326 The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 devices. A local unprivileged attacker can exploit this weakness to extract data from update images, gaining limited information about the device's architecture and internal processes.


How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker with local access but no privileges can extract some data from update images, potentially revealing limited architectural and internal process information. This could aid in further attacks or reverse engineering but does not directly compromise data integrity or availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart