Home

Description

During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-15 | Updated 2025-09-15 | Assigner CERTVDE




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

Problem types

CWE-1188 Insecure Default Initialization of Resource

Product status

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

Default status
unaffected

Any version before HW
affected

Default status
unaffected

Any version before 04.08.05
affected

References

certvde.com/en/advisories/VDE-2025-083

wago.csaf-tp.certvde.com/...saf/white/2025/vde-2025-083.json

cve.org (CVE-2025-41713)

nvd.nist.gov (CVE-2025-41713)

Download JSON