Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41704: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP

0
Medium
VulnerabilityCVE-2025-41704cvecve-2025-41704cwe-770
Published: Tue Oct 14 2025 (10/14/2025, 08:05:34 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: QUINT4-UPS/24DC/24DC/5/EIP

Description

An unauthanticated remote attacker can perform a DoS of the Modbus service by sending a specific function and sub-function code without affecting the core functionality.

AI-Powered Analysis

AILast updated: 10/14/2025, 08:45:47 UTC

Technical Analysis

CVE-2025-41704 is a resource allocation vulnerability categorized under CWE-770, found in the Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP power supply units. The flaw allows an unauthenticated remote attacker to send a crafted Modbus function and sub-function code that triggers uncontrolled resource allocation or consumption within the Modbus service of the device. This results in a denial-of-service (DoS) condition that disrupts Modbus communications, which are commonly used for monitoring and controlling industrial equipment. Importantly, the core power supply functionality remains unaffected, but the loss of Modbus service can hinder supervisory control and data acquisition (SCADA) systems or other automation processes relying on Modbus data. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely over the network. The affected product version is identified as VC:00, and no patches or exploits are currently publicly available. The CVSS 3.1 score of 5.3 reflects the network attack vector, low complexity, no privileges required, and no user interaction, with impact limited to availability of the Modbus service only. This vulnerability highlights the risk of insufficient resource management in industrial communication protocols, which can lead to service disruption even without compromising device core functions.

Potential Impact

For European organizations, especially those operating critical infrastructure, manufacturing plants, or industrial automation relying on Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP devices, this vulnerability poses a risk of operational disruption. The denial-of-service on the Modbus service can prevent real-time monitoring, control commands, and data acquisition, potentially delaying fault detection and response. While the core power supply remains functional, loss of Modbus communication can degrade system visibility and control, increasing the risk of cascading failures or safety incidents. Organizations in sectors such as energy, utilities, transportation, and manufacturing that use these devices in their control networks could experience reduced operational efficiency and increased downtime. The unauthenticated nature of the attack increases the threat surface, especially for devices exposed to less secure network segments or lacking proper network segmentation. Although no known exploits exist yet, the vulnerability's medium severity and ease of exploitation warrant proactive mitigation to avoid potential future attacks.

Mitigation Recommendations

1. Network Segmentation: Isolate devices running Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP from untrusted networks and restrict Modbus traffic to only authorized management systems. 2. Access Controls: Implement strict firewall rules and access control lists (ACLs) to limit incoming Modbus requests to trusted sources. 3. Monitoring and Anomaly Detection: Deploy network monitoring tools to detect unusual Modbus traffic patterns or repeated function/sub-function codes indicative of exploitation attempts. 4. Vendor Coordination: Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Incident Response Preparedness: Develop and test response plans for Modbus service disruptions to minimize operational impact. 6. Disable Unused Services: If Modbus communication is not required on certain devices, disable the service to reduce attack surface. 7. Use of Intrusion Prevention Systems (IPS): Configure IPS to detect and block malformed or suspicious Modbus packets targeting this vulnerability. These measures go beyond generic advice by focusing on network-level controls, proactive detection, and vendor engagement specific to the affected product and protocol.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.310Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee0d9d9bdcb328280b3ed0

Added to database: 10/14/2025, 8:45:17 AM

Last enriched: 10/14/2025, 8:45:47 AM

Last updated: 10/14/2025, 10:56:40 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats