Impact
Microchip Time Provider 4100 firmware before version 2.5.0 uses hard‑coded passwords to decrypt upgrade images, allowing a malicious actor to craft a forged update that will be accepted and installed by the device. This flaw could lead to arbitrary code execution, data tampering, or denial of service on the compromised hardware. The weakness is categorized as CWE‑798 (Use of Hard‑coded Credentials).
Affected Systems
The vulnerability affects Microchip Time Provider 4100 devices running firmware versions earlier than 2.5.0; newer releases contain the fix.
Risk and Exploitability
The CVSS score of 5.5 reflects moderate severity, and no EPSS value is available. The flaw is not listed in the CISA KEV catalog. Exploitation requires access to the device’s upgrade interface, which operates over a separate management port. If that port is exposed to an untrusted network, an attacker can hijack the upgrade flow and push malicious firmware. When restricted to a trusted environment and protected by ACLs, the risk is greatly reduced, but the fundamental vulnerability remains until the firmware is updated.
OpenCVE Enrichment