The privileged user could log in without sufficient credentials after enabling an application protocol. This security issue has been fixed in the latest script patch latest version of of Eaton BLSS (7.3.0.SCP004).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 16:30:00 +0000


Mon, 03 Nov 2025 16:00:00 +0000


Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
Description The privileged user could log in without sufficient credentials after enabling an application protocol. The privileged user could log in without sufficient credentials after enabling an application protocol. This security issue has been fixed in the latest script patch latest version of of Eaton BLSS (7.3.0.SCP004).

Mon, 03 Nov 2025 08:30:00 +0000

Type Values Removed Values Added
Description The privileged user could log in without sufficient credentials after enabling an application protocol.
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2025-11-03T15:48:09.729Z

Reserved: 2025-05-20T04:07:25.101Z

Link: CVE-2025-48397

cve-icon Vulnrichment

Updated: 2025-11-03T13:22:05.909Z

cve-icon NVD

Status : Received

Published: 2025-11-03T09:15:46.057

Modified: 2025-11-03T16:15:35.057

Link: CVE-2025-48397

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.