CVE-2025-41711
Password Hash Disclosure via Firmware Extraction Enables Remote Brute Force
Publication date: 2026-03-10
Last updated on: 2026-03-10
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| janitza | umg_96rm_e | to 3.13 (inc) |
| weidmueller | energy_meter | to 3.13 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an unauthenticated remote attacker to extract password hashes from firmware images of certain devices. The attacker can then attempt to brute force these hashes to obtain plaintext passwords of accounts that have limited access.
It specifically affects Janitza UMG 96RM-E and Weidmueller energy meter devices, where broken or risky cryptographic algorithms are used, enabling this extraction and brute forcing.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker can gain access to password hashes and potentially recover plaintext passwords for accounts with limited access on the affected devices.
This could allow unauthorized access to these devices, potentially leading to further exploitation or unauthorized control, depending on the privileges of the compromised accounts.
The CVSS score of 5.3 (Medium) indicates a moderate level of risk, with the attack requiring no privileges or user interaction but resulting in limited confidentiality impact.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the firmware of affected devices to version 3.14, where this vulnerability and related issues are fixed.
- Update Janitza UMG 96RM-E and Weidmueller Energy Meter devices to firmware version 3.14.
- Change default passwords on affected devices.
- Limit network exposure by restricting device access to trusted networks only.