Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-20399 | An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file. |
| Link | Providers |
|---|---|
| https://certvde.com/en/advisories/VDE-2025-054 |
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An low privileged remote attacker can enforce the watchdog of the affected devices to reboot the PLC due to incorrect default permissions of a config file. | |
| Title | Phoenix Contact: DoS of the PLC due to incorrect default permissions possible | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-07-08T14:10:19.960Z
Reserved: 2025-04-16T11:17:48.307Z
Link: CVE-2025-41665
Updated: 2025-07-08T14:10:14.154Z
Status : Deferred
Published: 2025-07-08T07:15:25.457
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41665
No data.
OpenCVE Enrichment
No data.
EUVD