Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41692: CWE-916 Use of Password Hash With Insufficient Computational Effort in Phoenix Contact FL SWITCH 2005

0
Medium
VulnerabilityCVE-2025-41692cvecve-2025-41692cwe-916
Published: Tue Dec 09 2025 (12/09/2025, 08:12:40 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.

AI-Powered Analysis

AILast updated: 12/16/2025, 10:34:26 UTC

Technical Analysis

CVE-2025-41692 identifies a security vulnerability in the Phoenix Contact FL SWITCH 2005 series, specifically related to the use of a password hashing algorithm that does not apply sufficient computational effort to protect stored OS-level passwords. The weakness falls under CWE-916, which concerns the use of password hashes that are too fast to compute, enabling attackers to perform brute-force attacks efficiently. An attacker with high privileges on the device's webUI can exploit this by attempting to brute-force the 'root' and 'user' passwords of the underlying operating system. Since the hashing algorithm is weak, the computational cost to test each password guess is low, increasing the feasibility of successful brute-force attacks. The vulnerability does not require user interaction but does require the attacker to already have admin-level access to the webUI, which limits initial attack vectors but elevates risk once access is obtained. The vulnerability impacts confidentiality by potentially exposing OS credentials, which could lead to further system compromise or lateral movement within a network. The CVSS v3.1 score of 6.8 reflects a medium severity, with network attack vector, low attack complexity, high privileges required, no user interaction, and a scope change due to potential compromise beyond the webUI. No known exploits are currently in the wild, and no patches have been linked yet, indicating the need for proactive mitigation. The affected product is primarily used in industrial and critical infrastructure environments, where secure device management is essential.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk to the confidentiality of device credentials. Compromise of root or user passwords on FL SWITCH 2005 devices could allow attackers to gain deeper access to network segments, potentially facilitating lateral movement, data exfiltration, or disruption of industrial processes. Given the device's role in network switching within industrial environments, unauthorized access could undermine network segmentation and security controls. The vulnerability's requirement for prior admin access to the webUI reduces the likelihood of initial compromise but elevates the risk of privilege escalation and persistence once inside. European organizations relying on Phoenix Contact products must consider the potential for targeted attacks, especially in countries with a strong industrial base and high adoption of these devices. The absence of known exploits in the wild provides a window for remediation, but the medium severity score indicates that the threat should not be underestimated.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available to address the weak password hashing implementation. 2. Enforce strong password policies for both webUI and OS-level accounts, including the use of complex, high-entropy passwords that resist brute-force attempts. 3. Restrict administrative webUI access through network segmentation, allowing only trusted management networks or VPNs to connect. 4. Implement multi-factor authentication (MFA) for webUI access to reduce the risk of credential compromise leading to further exploitation. 5. Monitor device logs and network traffic for signs of brute-force attempts or unusual authentication failures targeting the webUI or OS accounts. 6. Conduct regular security audits and penetration tests focusing on industrial control systems and network devices to identify and remediate similar weaknesses. 7. Educate operational technology (OT) security teams about the risks of weak password hashing and the importance of layered security controls in industrial environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.309Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937da90964788758a8a3fc8

Added to database: 12/9/2025, 8:15:12 AM

Last enriched: 12/16/2025, 10:34:26 AM

Last updated: 2/5/2026, 10:41:09 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats