Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30428 | The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device. |
Solution
These vulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. Customers are strongly encouraged to upgrade by downloading software version 3.1.0.1 or newer at the Vitogate 300 website.
Workaround
No workaround given by the vendor.
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Viessmann
Viessmann vitogate 300 |
|
| Vendors & Products |
Viessmann
Viessmann vitogate 300 |
Tue, 23 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device. | |
| Title | Viessmann Vitogate 300 Authentication Bypass | |
| Weaknesses | CWE-602 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Carrier
Published:
Updated: 2025-09-23T13:33:47.319Z
Reserved: 2025-08-26T17:40:58.043Z
Link: CVE-2025-9495
Updated: 2025-09-23T13:33:44.366Z
Status : Awaiting Analysis
Published: 2025-09-23T02:15:47.563
Modified: 2025-09-24T18:11:24.520
Link: CVE-2025-9495
No data.
OpenCVE Enrichment
Updated: 2025-09-23T16:03:21Z
EUVD