Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2025-26408", "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "state": "PUBLISHED", "assignerShortName": "SEC-VLab", "dateReserved": "2025-02-10T07:48:38.352Z", "datePublished": "2025-02-11T09:14:28.700Z", "dateUpdated": "2025-03-22T14:41:30.878Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "affected", "product": "Wattsense Bridge", "vendor": "Wattsense", "versions": [{"status": "affected", "version": "*"}]}], "credits": [{"lang": "en", "type": "finder", "value": "Constantin Schieber-Kn\u00f6bl | SEC Consult Vulnerability Lab"}, {"lang": "en", "type": "finder", "value": "Stefan Schweighofer | SEC Consult Vulnerability Lab"}, {"lang": "en", "type": "finder", "value": "Steffen Robertz | SEC Consult Vulnerability Lab"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected.<br><br>"}], "value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected."}], "impacts": [{"capecId": "CAPEC-702", "descriptions": [{"lang": "en", "value": "CAPEC-702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-1191", "description": "CWE-1191 On-Chip Debug and Test Interface With Improper Access Control", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "shortName": "SEC-VLab", "dateUpdated": "2025-02-11T09:14:28.700Z"}, "references": [{"tags": ["third-party-advisory"], "url": "https://r.sec-consult.com/wattsense"}, {"tags": ["release-notes"], "url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">The device is meant to be installed at a restricted access physical location according to the vendor and exploitation requires </span>more attacker knowledge and higher physical access. The issue will be put in the backlog of the Wattsense team."}], "value": "The device is meant to be installed at a restricted access physical location according to the vendor and exploitation requires\u00a0more attacker knowledge and higher physical access. The issue will be put in the backlog of the Wattsense team."}], "source": {"discovery": "EXTERNAL"}, "title": "Unprotected JTAG Interface", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2025-02-11T14:40:43.535274Z", "id": "CVE-2025-26408", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-03-22T14:41:30.878Z"}}]}}