A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Jumo
Jumo varitrons300
Jumo varitrons500
Vendors & Products Jumo
Jumo varitrons300
Jumo varitrons500

Mon, 10 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.
Title Jumo: Insufficient entropy in PRNG may lead to root access
Weaknesses CWE-338
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-11-10T15:20:07.843Z

Reserved: 2025-04-16T11:17:48.319Z

Link: CVE-2025-41731

cve-icon Vulnrichment

Updated: 2025-11-10T15:19:02.860Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-10T08:15:33.957

Modified: 2025-11-12T16:19:59.103

Link: CVE-2025-41731

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-12T12:50:12Z

Weaknesses