Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13406: CWE-476 NULL Pointer Dereference in Softing smartLink SW-HT

0
Medium
VulnerabilityCVE-2025-13406cvecve-2025-13406cwe-476
Published: Tue Mar 17 2026 (03/17/2026, 14:32:21 UTC)
Source: CVE Database V5
Vendor/Project: Softing
Product: smartLink SW-HT

Description

NULL Pointer Dereference vulnerability in Softing Industrial Automation GmbH smartLink SW-HT (Webserver modules) allows HTTP DoS.This issue affects smartLink SW-HT: 1.43.

AI-Powered Analysis

AILast updated: 03/17/2026, 14:57:47 UTC

Technical Analysis

CVE-2025-13406 identifies a NULL Pointer Dereference vulnerability (CWE-476) in the webserver modules of Softing Industrial Automation GmbH's smartLink SW-HT product, specifically version 1.43. This vulnerability occurs when the software improperly handles certain HTTP requests, leading to dereferencing a null pointer in memory. The consequence is a denial-of-service (DoS) condition where the affected webserver module crashes or becomes unresponsive, disrupting normal device operation. The vulnerability requires an attacker to have high privileges and user interaction, indicating that exploitation is not trivial but possible in environments where an attacker gains some level of authenticated access or tricks a user into initiating the attack. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), high privileges required (PR:H), user interaction needed (UI:A), no impact on confidentiality or integrity, but high impact on availability (VA:H). The vulnerability affects only version 1.43 of smartLink SW-HT, a product used in industrial automation for communication and monitoring. No public exploits or patches are currently known, but the vulnerability is published and should be addressed promptly. The root cause is a failure to validate pointers before dereferencing, a common programming error that can lead to crashes. This vulnerability could be leveraged by attackers to disrupt industrial processes by causing device downtime, potentially impacting operational continuity.

Potential Impact

The primary impact of CVE-2025-13406 is denial of service, which can cause operational disruptions in industrial environments relying on smartLink SW-HT devices. Since these devices are used for communication and monitoring in industrial automation, a DoS condition could halt data collection, control commands, or monitoring functions, leading to potential production delays, safety risks, or financial losses. Although the vulnerability does not expose confidential data or allow unauthorized data modification, the availability impact is significant in critical infrastructure or manufacturing settings. The requirement for high privileges and user interaction reduces the likelihood of widespread exploitation but does not eliminate risk in environments with weak access controls or social engineering vulnerabilities. Organizations with large deployments of affected devices may face increased operational risk and potential downtime until mitigations or patches are applied.

Mitigation Recommendations

To mitigate CVE-2025-13406, organizations should implement the following specific measures: 1) Restrict network access to the smartLink SW-HT webserver interface using firewalls and access control lists to limit exposure only to trusted management networks. 2) Enforce strong authentication and authorization policies to prevent unauthorized or low-privilege users from accessing the device interface. 3) Employ network segmentation to isolate industrial automation devices from general enterprise networks and the internet. 4) Monitor HTTP traffic to the smartLink SW-HT devices for unusual or malformed requests that could trigger the vulnerability. 5) Educate users and administrators about the risk of social engineering that could lead to user interaction exploitation. 6) Maintain an active vulnerability management program to track updates from Softing and apply patches promptly once available. 7) Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting anomalous HTTP requests against these devices. These targeted steps go beyond generic advice by focusing on access control, monitoring, and user awareness specific to the affected product and vulnerability type.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Softing
Date Reserved
2025-11-19T14:07:24.595Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9688b771bdb1749b843f2

Added to database: 3/17/2026, 2:43:23 PM

Last enriched: 3/17/2026, 2:57:47 PM

Last updated: 3/17/2026, 3:47:35 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses