Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25419 | A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication. |
Solution
OPC UA C++ SDK V6.80.1 Service-Patch
Workaround
No workaround given by the vendor.
Thu, 21 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 Aug 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Softing
Softing edgeaggregator Softing edgeconnector Softing opc |
|
| Vendors & Products |
Softing
Softing edgeaggregator Softing edgeconnector Softing opc |
Thu, 21 Aug 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication. | |
| Title | Bypass the client certificate trust check of an opc.https server while only secure communication is allowed | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Softing
Published:
Updated: 2025-08-21T13:53:15.381Z
Reserved: 2025-07-09T13:09:38.988Z
Link: CVE-2025-7390
Updated: 2025-08-21T13:51:57.325Z
Status : Awaiting Analysis
Published: 2025-08-21T06:15:35.157
Modified: 2025-08-22T18:09:17.710
Link: CVE-2025-7390
No data.
OpenCVE Enrichment
Updated: 2025-08-21T12:58:56Z
EUVD