Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Do not expose the web interface on the separate management port to an untrusted network. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.
Tue, 28 Oct 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip timeprovider 4100 Firmware
|
|
| CPEs | cpe:2.3:h:microchip:timeprovider_4100:-:*:*:*:*:*:*:* cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microchip timeprovider 4100 Firmware
|
|
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip
Microchip timeprovider 4100 |
|
| Vendors & Products |
Microchip
Microchip timeprovider 4100 |
Mon, 20 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Microchip Time Provider 4100 allows OS Command Injection.This issue affects Time Provider 4100: before 2.5. | |
| Title | RCE on backup configuration password | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2025-10-20T18:02:36.954Z
Reserved: 2025-05-13T19:24:53.452Z
Link: CVE-2025-47900
Updated: 2025-10-20T18:01:41.115Z
Status : Analyzed
Published: 2025-10-20T18:15:38.440
Modified: 2025-10-28T15:29:13.490
Link: CVE-2025-47900
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:36Z