CVE-2025-41728
Out-of-Bounds Read in Device Manager Web Service Exposes Data
Publication date: 2026-01-27
Last updated on: 2026-01-27
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| beckhoff | device_manager | to 2.5.3 (exc) |
| beckhoff | mdp | to 1.7.0.0 (exc) |
| beckhoff | mdp_bhf | to 0.0.5-1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows a low privileged remote attacker to send specially crafted calls to the Device Manager web service, causing an out-of-bounds read operation due to ASLR under certain circumstances. This can lead to disclosure of confidential information from the memory of a privileged process by potentially copying that information into a response.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of confidential information from privileged process memory to a remote attacker, which may compromise sensitive data confidentiality without affecting integrity or availability.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the affected Beckhoff Device Manager and related software packages to the fixed versions. Specifically, update to Beckhoff.Device.Manager.XAR tcpkg package version 2.5.3 or later, MDP software package for TwinCAT/BSD version 1.7.0.0 or later, and mdp-bhf software package for Beckhoff RT Linux(R) version 0.0.5-1 or later. [1]