The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
Metrics
Affected Vendors & Products
Fixes
Solution
These vulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. Customers are strongly encouraged to upgrade by downloading software version 3.1.0.1 or newer at the Vitogate 300 website.
Workaround
No workaround given by the vendor.
References
History
Tue, 23 Sep 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device. | |
Title | Viessmann Vitogate 300 Authentication Bypass | |
Weaknesses | CWE-602 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2025-09-23T01:16:53.619Z
Reserved: 2025-08-26T17:40:58.043Z
Link: CVE-2025-9495

No data.

Status : Received
Published: 2025-09-23T02:15:47.563
Modified: 2025-09-23T02:15:47.563
Link: CVE-2025-9495

No data.

No data.