Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
|
| Vendors & Products |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
Tue, 02 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance. | |
| Title | Sprecher Automation: SPRECON-E series has a critical vulnerability due to the use of static cryptographic keys in system components | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-12-02T16:54:31.534Z
Reserved: 2025-04-16T11:17:48.321Z
Link: CVE-2025-41742
Updated: 2025-12-02T16:53:17.993Z
Status : Awaiting Analysis
Published: 2025-12-02T11:15:51.153
Modified: 2025-12-02T17:16:29.163
Link: CVE-2025-41742
No data.
OpenCVE Enrichment
Updated: 2025-12-03T12:10:12Z