Skip to main content

CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR

Critical
VulnerabilityCVE-2025-3495cvecve-2025-3495cwe-338
Published: Wed Apr 16 2025 (04/16/2025, 03:10:05 UTC)
Source: CVE Database V5
Vendor/Project: Delta Electronics
Product: COMMGR

Description

Delta Electronics COMMGR v1 and v2 uses insufficiently randomized values to generate session IDs (CWE-338). An attacker could easily brute force a session ID and load and execute arbitrary code.

AI-Powered Analysis

AILast updated: 08/19/2025, 00:47:46 UTC

Technical Analysis

CVE-2025-3495 is a critical vulnerability identified in Delta Electronics' COMMGR software versions 1 and 2. The root cause is the use of a cryptographically weak pseudo-random number generator (PRNG) for generating session IDs, classified under CWE-338. This weakness results in insufficient randomness in session identifiers, making them predictable or brute-forceable by attackers. Exploiting this flaw, an attacker can guess or brute force valid session IDs without any authentication or user interaction, allowing them to hijack sessions. Once a session is compromised, the attacker can load and execute arbitrary code on the affected system, leading to full compromise of confidentiality, integrity, and availability. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the ease of exploitation and potential impact make this a high-risk issue. The vulnerability affects Delta Electronics COMMGR, a product likely used in industrial or building automation environments, given Delta Electronics' market focus. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, building management, or critical infrastructure sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized control over industrial control systems or building automation devices, potentially causing operational disruptions, safety hazards, or data breaches. The ability to execute arbitrary code remotely without authentication could allow attackers to deploy ransomware, sabotage operations, or exfiltrate sensitive data. Given Europe's strong regulatory environment around critical infrastructure and data protection (e.g., NIS Directive, GDPR), exploitation could also result in regulatory penalties and reputational damage. Organizations relying on Delta Electronics COMMGR for device management or communication should consider this vulnerability a priority for risk assessment and remediation planning.

Mitigation Recommendations

1. Immediate network segmentation: Isolate devices running COMMGR from general IT networks and limit access to trusted management stations only. 2. Implement strict firewall rules to restrict inbound traffic to COMMGR services, allowing only known and authorized IP addresses. 3. Monitor network traffic for unusual session ID patterns or brute force attempts targeting COMMGR session management. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts related to weak session ID generation. 5. Engage with Delta Electronics for updates or patches; if none are available, consider temporary compensating controls such as disabling remote access or replacing the vulnerable software with alternatives. 6. Conduct regular audits of devices running COMMGR to identify unauthorized code execution or anomalous behavior. 7. Educate operational technology (OT) and security teams about this vulnerability and ensure incident response plans include scenarios involving COMMGR compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Deltaww
Date Reserved
2025-04-10T06:21:03.795Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a3c696ad5a09ad00e23102

Added to database: 8/19/2025, 12:34:30 AM

Last enriched: 8/19/2025, 12:47:46 AM

Last updated: 8/19/2025, 2:02:43 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats