CVE-2025-41704: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP
An unauthanticated remote attacker can perform a DoS of the Modbus service by sending a specific function and sub-function code without affecting the core functionality.
AI Analysis
Technical Summary
CVE-2025-41704 is a resource allocation vulnerability categorized under CWE-770, found in the Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP power supply units. The flaw allows an unauthenticated remote attacker to send a crafted Modbus function and sub-function code that triggers uncontrolled resource allocation or consumption within the Modbus service of the device. This results in a denial-of-service (DoS) condition that disrupts Modbus communications, which are commonly used for monitoring and controlling industrial equipment. Importantly, the core power supply functionality remains unaffected, but the loss of Modbus service can hinder supervisory control and data acquisition (SCADA) systems or other automation processes relying on Modbus data. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely over the network. The affected product version is identified as VC:00, and no patches or exploits are currently publicly available. The CVSS 3.1 score of 5.3 reflects the network attack vector, low complexity, no privileges required, and no user interaction, with impact limited to availability of the Modbus service only. This vulnerability highlights the risk of insufficient resource management in industrial communication protocols, which can lead to service disruption even without compromising device core functions.
Potential Impact
For European organizations, especially those operating critical infrastructure, manufacturing plants, or industrial automation relying on Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP devices, this vulnerability poses a risk of operational disruption. The denial-of-service on the Modbus service can prevent real-time monitoring, control commands, and data acquisition, potentially delaying fault detection and response. While the core power supply remains functional, loss of Modbus communication can degrade system visibility and control, increasing the risk of cascading failures or safety incidents. Organizations in sectors such as energy, utilities, transportation, and manufacturing that use these devices in their control networks could experience reduced operational efficiency and increased downtime. The unauthenticated nature of the attack increases the threat surface, especially for devices exposed to less secure network segments or lacking proper network segmentation. Although no known exploits exist yet, the vulnerability's medium severity and ease of exploitation warrant proactive mitigation to avoid potential future attacks.
Mitigation Recommendations
1. Network Segmentation: Isolate devices running Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP from untrusted networks and restrict Modbus traffic to only authorized management systems. 2. Access Controls: Implement strict firewall rules and access control lists (ACLs) to limit incoming Modbus requests to trusted sources. 3. Monitoring and Anomaly Detection: Deploy network monitoring tools to detect unusual Modbus traffic patterns or repeated function/sub-function codes indicative of exploitation attempts. 4. Vendor Coordination: Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Incident Response Preparedness: Develop and test response plans for Modbus service disruptions to minimize operational impact. 6. Disable Unused Services: If Modbus communication is not required on certain devices, disable the service to reduce attack surface. 7. Use of Intrusion Prevention Systems (IPS): Configure IPS to detect and block malformed or suspicious Modbus packets targeting this vulnerability. These measures go beyond generic advice by focusing on network-level controls, proactive detection, and vendor engagement specific to the affected product and protocol.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-41704: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP
Description
An unauthanticated remote attacker can perform a DoS of the Modbus service by sending a specific function and sub-function code without affecting the core functionality.
AI-Powered Analysis
Technical Analysis
CVE-2025-41704 is a resource allocation vulnerability categorized under CWE-770, found in the Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP power supply units. The flaw allows an unauthenticated remote attacker to send a crafted Modbus function and sub-function code that triggers uncontrolled resource allocation or consumption within the Modbus service of the device. This results in a denial-of-service (DoS) condition that disrupts Modbus communications, which are commonly used for monitoring and controlling industrial equipment. Importantly, the core power supply functionality remains unaffected, but the loss of Modbus service can hinder supervisory control and data acquisition (SCADA) systems or other automation processes relying on Modbus data. The vulnerability does not require authentication or user interaction, making it easier to exploit remotely over the network. The affected product version is identified as VC:00, and no patches or exploits are currently publicly available. The CVSS 3.1 score of 5.3 reflects the network attack vector, low complexity, no privileges required, and no user interaction, with impact limited to availability of the Modbus service only. This vulnerability highlights the risk of insufficient resource management in industrial communication protocols, which can lead to service disruption even without compromising device core functions.
Potential Impact
For European organizations, especially those operating critical infrastructure, manufacturing plants, or industrial automation relying on Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP devices, this vulnerability poses a risk of operational disruption. The denial-of-service on the Modbus service can prevent real-time monitoring, control commands, and data acquisition, potentially delaying fault detection and response. While the core power supply remains functional, loss of Modbus communication can degrade system visibility and control, increasing the risk of cascading failures or safety incidents. Organizations in sectors such as energy, utilities, transportation, and manufacturing that use these devices in their control networks could experience reduced operational efficiency and increased downtime. The unauthenticated nature of the attack increases the threat surface, especially for devices exposed to less secure network segments or lacking proper network segmentation. Although no known exploits exist yet, the vulnerability's medium severity and ease of exploitation warrant proactive mitigation to avoid potential future attacks.
Mitigation Recommendations
1. Network Segmentation: Isolate devices running Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP from untrusted networks and restrict Modbus traffic to only authorized management systems. 2. Access Controls: Implement strict firewall rules and access control lists (ACLs) to limit incoming Modbus requests to trusted sources. 3. Monitoring and Anomaly Detection: Deploy network monitoring tools to detect unusual Modbus traffic patterns or repeated function/sub-function codes indicative of exploitation attempts. 4. Vendor Coordination: Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Incident Response Preparedness: Develop and test response plans for Modbus service disruptions to minimize operational impact. 6. Disable Unused Services: If Modbus communication is not required on certain devices, disable the service to reduce attack surface. 7. Use of Intrusion Prevention Systems (IPS): Configure IPS to detect and block malformed or suspicious Modbus packets targeting this vulnerability. These measures go beyond generic advice by focusing on network-level controls, proactive detection, and vendor engagement specific to the affected product and protocol.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.310Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee0d9d9bdcb328280b3ed0
Added to database: 10/14/2025, 8:45:17 AM
Last enriched: 10/14/2025, 8:45:47 AM
Last updated: 10/14/2025, 10:56:40 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Windows 10 Still on Over 40% of Devices as It Reaches End of Support
MediumCVE-2024-54678: CWE-502: Deserialization of Untrusted Data in Siemens SIMATIC PCS neo V4.1
HighCVE-2024-33698: CWE-122: Heap-based Buffer Overflow in Siemens Opcenter Quality
CriticalCVE-2023-52236: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Siemens RUGGEDCOM i800
HighCVE-2025-40812: CWE-125: Out-of-bounds Read in Siemens Solid Edge SE2024
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.