Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Do not expose the web interface on the separate management port to an untrusted network. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.
Tue, 28 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip timeprovider 4100 Firmware
|
|
| CPEs | cpe:2.3:h:microchip:timeprovider_4100:-:*:*:*:*:*:*:* cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microchip timeprovider 4100 Firmware
|
|
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip
Microchip timeprovider 4100 |
|
| Vendors & Products |
Microchip
Microchip timeprovider 4100 |
Mon, 20 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Microchip Time Provider 4100 allows OS Command Injection.This issue affects Time Provider 4100: before 2.5. | |
| Title | RCE on restore configuration password | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2025-10-21T15:38:55.864Z
Reserved: 2025-05-13T19:24:53.452Z
Link: CVE-2025-47901
Updated: 2025-10-20T20:21:57.198Z
Status : Analyzed
Published: 2025-10-20T18:15:38.590
Modified: 2025-10-28T15:38:34.610
Link: CVE-2025-47901
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:32Z