Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jumo
Jumo varitrons300 Jumo varitrons500 |
|
| Vendors & Products |
Jumo
Jumo varitrons300 Jumo varitrons500 |
Mon, 10 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 10 Nov 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled. | |
| Title | Jumo: Insufficient entropy in PRNG may lead to root access | |
| Weaknesses | CWE-338 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-11-10T15:20:07.843Z
Reserved: 2025-04-16T11:17:48.319Z
Link: CVE-2025-41731
Updated: 2025-11-10T15:19:02.860Z
Status : Deferred
Published: 2025-11-10T08:15:33.957
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41731
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:50:12Z