CVE-2025-41743
BaseFortify
Publication date: 2025-12-02
Last updated on: 2026-02-23
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sprecher-automation | sprecon-e-c_firmware | to 9.0 (exc) |
| sprecher-automation | sprecon-e-p_firmware | to 9.0 (exc) |
| sprecher-automation | sprecon-e-t3_firmware | to 9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-326 | The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 devices. A local unprivileged attacker can exploit this weakness to extract data from update images, gaining limited information about the device's architecture and internal processes.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker with local access but no privileges can extract some data from update images, potentially revealing limited architectural and internal process information. This could aid in further attacks or reverse engineering but does not directly compromise data integrity or availability.