The use of a client certificate reduces the risk for random devices to take advantage of this flaw.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-13609 | The MQTT add-on of PcVue fails to verify that a remote device’s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly. The use of a client certificate reduces the risk for random devices to take advantage of this flaw. |
Solution
Harden the configuration Who should apply this recommendation: All users The system operators are highly recommended to take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: * Use client certificate when configuring the MQTT add-on. * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet unless required. * Locate control system networks and remote devices behind firewalls and isolate them from business networks. * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices. Update PcVue Who should apply this recommendation: All users using the affected component Apply the patch by installing a fixed PcVue version. Available patches: Fixed in: * PcVue 16.2.5 and PcVue 16.3.0 * PcVue 15.2.12
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.pcvue.com/security/#SB2025-3 |
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 06 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MQTT add-on of PcVue fails to verify that a remote device’s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly. The use of a client certificate reduces the risk for random devices to take advantage of this flaw. | |
| Title | Certificate validity not properly verified | |
| Weaknesses | CWE-298 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: arcinfo
Published:
Updated: 2025-09-05T16:38:07.518Z
Reserved: 2025-05-06T15:02:58.174Z
Link: CVE-2025-4384
Updated: 2025-05-06T19:25:46.615Z
Status : Awaiting Analysis
Published: 2025-05-06T16:15:32.340
Modified: 2025-05-07T14:13:20.483
Link: CVE-2025-4384
No data.
OpenCVE Enrichment
Updated: 2025-06-24T09:44:16Z
EUVD