Home

Description

A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-10 | Updated 2025-11-10 | Assigner CERTVDE




HIGH: 7.4CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Product status

Default status
unaffected

0.0.0.0 (semver) before 9.0.2.5
affected

Default status
unaffected

0.0.0.0 (semver) before 9.0.2.5
affected

Default status
unaffected

0.0.0.0 (semver) before 9.0.2.5
affected

References

jumo.csaf-tp.certvde.com/...saf/white/2025/vde-2025-086.json

cve.org (CVE-2025-41731)

nvd.nist.gov (CVE-2025-41731)

Download JSON