The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
Fixes

Solution

These vulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. Customers are strongly encouraged to upgrade by downloading software version 3.1.0.1 or newer at the Vitogate 300 website.


Workaround

No workaround given by the vendor.

History

Tue, 23 Sep 2025 01:45:00 +0000

Type Values Removed Values Added
Description The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.
Title Viessmann Vitogate 300 Authentication Bypass
Weaknesses CWE-602
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published:

Updated: 2025-09-23T01:16:53.619Z

Reserved: 2025-08-26T17:40:58.043Z

Link: CVE-2025-9495

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-23T02:15:47.563

Modified: 2025-09-23T02:15:47.563

Link: CVE-2025-9495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.