enforce authentication mechanisms. This vulnerability could allow
unauthorized users to access and manipulate monitoring and control
functions.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Packet Power recommends the following: * Update the affected products to version 4.1.0 or later. * Isolate devices whenever possible.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23990 | By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions. |
Tue, 12 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Packet Power
Packet Power eg Packet Power emx |
|
| Vendors & Products |
Packet Power
Packet Power eg Packet Power emx |
Fri, 08 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 Aug 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | By default, the Packet Power Monitoring and Control Web Interface do not enforce authentication mechanisms. This vulnerability could allow unauthorized users to access and manipulate monitoring and control functions. | |
| Title | Packet Power EMX and EG Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-08T19:14:38.595Z
Reserved: 2025-07-28T14:22:48.148Z
Link: CVE-2025-8284
Updated: 2025-08-08T19:14:34.368Z
Status : Deferred
Published: 2025-08-08T17:15:30.010
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-8284
No data.
OpenCVE Enrichment
Updated: 2025-08-12T11:47:27Z
EUVD