Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 02 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance. | |
| Title | Sprecher Automation: SPRECON-E series has a critical vulnerability due to the use of static cryptographic keys in system components | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-12-02T10:39:08.982Z
Reserved: 2025-04-16T11:17:48.321Z
Link: CVE-2025-41742
No data.
Status : Received
Published: 2025-12-02T11:15:51.153
Modified: 2025-12-02T11:15:51.153
Link: CVE-2025-41742
No data.
OpenCVE Enrichment
No data.