Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13635 | In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions. |
Solution
Optigo Networks recommends users implement at least one of the following additional mitigations: * Use a dedicated NIC on the BMS computer and exclusively use the computer for connecting to OneView to manage your OT network configuration. * Set up a router firewall with a white list for the devices permitted to access OneView. * Connect to OneView via secure VPN.
Workaround
No workaround given by the vendor.
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 06 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 May 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions. | |
| Title | Use of Hard-coded Credentials Optigo Networks ONS NC600 | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-06T17:29:11.988Z
Reserved: 2025-04-28T14:39:33.460Z
Link: CVE-2025-4041
Updated: 2025-05-06T17:28:44.635Z
Status : Awaiting Analysis
Published: 2025-05-06T17:16:12.887
Modified: 2025-05-07T14:13:20.483
Link: CVE-2025-4041
No data.
OpenCVE Enrichment
No data.
EUVD