Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Upgrades are only available on a separate management port which should not be connected to an untrusted network. ACLs are available to further restrict access to only trusted addresses.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 31 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip
Microchip timeprovider 4100 |
|
| Vendors & Products |
Microchip
Microchip timeprovider 4100 |
Sat, 28 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of Hard-coded Credentials vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This issue affects Time Provider 4100: before 2.5.0. | |
| Title | Hardcoded Upgrade Decryption Passwords | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2026-04-01T13:55:03.527Z
Reserved: 2025-08-26T17:59:09.578Z
Link: CVE-2025-9497
Updated: 2026-04-01T13:54:57.440Z
Status : Awaiting Analysis
Published: 2026-03-28T11:16:35.337
Modified: 2026-04-01T14:16:25.980
Link: CVE-2025-9497
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:59:44Z