No analysis available yet.
Vendor Workaround
Upgrades are only available on a separate management port which should not be connected to an untrusted network. ACLs are available to further restrict access to only trusted addresses.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 31 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip timeprovider 4100 Firmware
|
|
| CPEs | cpe:2.3:h:microchip:timeprovider_4100:-:*:*:*:*:*:*:* cpe:2.3:o:microchip:timeprovider_4100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microchip timeprovider 4100 Firmware
|
|
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microchip
Microchip timeprovider 4100 |
|
| Vendors & Products |
Microchip
Microchip timeprovider 4100 |
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Download of Code Without Integrity Check vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This issue affects Time Provider 4100: before 2.5. | |
| Title | Unsigned upgrade package | |
| Weaknesses | CWE-494 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Microchip
Published:
Updated: 2026-03-31T10:39:23.425Z
Reserved: 2025-05-13T19:24:53.452Z
Link: CVE-2025-47904
Updated: 2026-02-26T19:52:15.134Z
Status : Modified
Published: 2026-02-24T16:24:06.680
Modified: 2026-03-31T11:16:13.267
Link: CVE-2025-47904
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:38:45Z