Skip to main content

CVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM

High
VulnerabilityCVE-2025-41686cvecve-2025-41686cwe-306
Published: Tue Aug 12 2025 (08/12/2025, 07:37:01 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: DaUM

Description

A low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access.

AI-Powered Analysis

AILast updated: 08/12/2025, 08:02:51 UTC

Technical Analysis

CVE-2025-41686 is a high-severity vulnerability affecting Phoenix Contact's DaUM product, identified as CWE-306: Missing Authentication for Critical Function. The vulnerability arises due to improper permissions set on the nssm.exe executable, which is part of the DaUM software suite. This misconfiguration allows a low-privileged local attacker to escalate their privileges to administrative level without requiring user interaction. Specifically, the attacker can exploit the weak permission settings on nssm.exe to execute unauthorized actions that should be restricted to administrators. The CVSS 3.1 base score of 7.8 reflects the significant impact on confidentiality, integrity, and availability, with an attack vector limited to local access but requiring low complexity and privileges. The vulnerability does not require user interaction, and the scope remains unchanged, meaning the escalation affects the same system. Although no known exploits are currently reported in the wild, the potential for privilege escalation makes this a critical concern for environments where DaUM is deployed. The lack of authentication for this critical function means that any local user with minimal access can gain full control, potentially leading to system compromise, data breaches, or disruption of industrial processes managed by DaUM.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that utilize Phoenix Contact's DaUM software, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized administrative access, enabling attackers to manipulate system configurations, disrupt operations, or exfiltrate sensitive data. Given Phoenix Contact's strong presence in European industrial automation markets, the impact could extend to critical infrastructure such as energy grids, transportation systems, and manufacturing plants. The ability to escalate privileges locally means that insider threats or attackers who gain initial foothold through other means could leverage this vulnerability to deepen their control. This could result in operational downtime, safety hazards, regulatory non-compliance, and financial losses. The absence of known patches at the time of disclosure further exacerbates the risk, necessitating immediate attention to mitigate potential exploitation.

Mitigation Recommendations

Organizations should implement strict access controls to limit local user permissions on systems running DaUM, ensuring that only trusted administrators have access to the affected machines. Employing application whitelisting and monitoring execution of nssm.exe can help detect and prevent unauthorized use. Network segmentation should be enforced to isolate critical systems and reduce the risk of lateral movement. Regular auditing of file and process permissions is essential to identify and correct improper configurations. Until an official patch is released, consider deploying host-based intrusion detection systems (HIDS) to monitor for suspicious privilege escalation attempts. Additionally, educating staff about the risks of local privilege escalation and enforcing the principle of least privilege can reduce the attack surface. Organizations should maintain close communication with Phoenix Contact for updates and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.309Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689af1a2ad5a09ad002f1695

Added to database: 8/12/2025, 7:47:46 AM

Last enriched: 8/12/2025, 8:02:51 AM

Last updated: 8/12/2025, 10:11:07 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats