Description
The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
Published: 2025-10-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Sauter
Sauter ey-modulo 5 Devices
Sauter modulo 6 Devices
Vendors & Products Sauter
Sauter ey-modulo 5 Devices
Sauter modulo 6 Devices

Wed, 22 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 07:15:00 +0000

Type Values Removed Values Added
Description The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
Title Sauter: Hard-coded Authentication Credentials
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Sauter Ey-modulo 5 Devices Modulo 6 Devices
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-10-22T13:30:10.827Z

Reserved: 2025-04-16T11:17:48.317Z

Link: CVE-2025-41722

cve-icon Vulnrichment

Updated: 2025-10-22T13:30:01.031Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T07:15:33.640

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-41722

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-23T10:07:57Z

Weaknesses