Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41705: CWE-523 Unprotected Transport of Credentials in Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP

0
Medium
VulnerabilityCVE-2025-41705cvecve-2025-41705cwe-523
Published: Tue Oct 14 2025 (10/14/2025, 08:05:43 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: QUINT4-UPS/24DC/24DC/5/EIP

Description

An unauthenticated remote attacker (MITM) can intercept the websocket messages to gain access to the login credentials for the Webfrontend.

AI-Powered Analysis

AILast updated: 10/14/2025, 08:46:00 UTC

Technical Analysis

CVE-2025-41705 is a vulnerability classified under CWE-523 (Unprotected Transport of Credentials) affecting the Phoenix Contact QUINT4-UPS/24DC/24DC/5/EIP device. The issue arises because websocket messages used for authentication in the device's web frontend are transmitted without adequate protection, allowing an unauthenticated remote attacker positioned as a man-in-the-middle (MITM) to intercept these messages and extract login credentials. The vulnerability does not require prior authentication but does require the attacker to have network access to intercept the websocket traffic, which may also require user interaction to trigger the login process. The CVSS v3.1 base score is 6.8 (medium severity), reflecting high impact on confidentiality and integrity but no impact on availability, and a higher attack complexity due to the need for MITM positioning and user interaction. The vulnerability affects version VC:00 of the product, with no patches currently available. The lack of encryption or secure transport for websocket communication is the root cause, exposing sensitive credentials to interception. This vulnerability could allow attackers to gain unauthorized access to the device's web interface, potentially leading to further compromise of industrial control systems or power management infrastructure. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in April 2025 and published in October 2025 by CERTVDE.

Potential Impact

For European organizations, especially those operating industrial automation, manufacturing, or critical infrastructure sectors, this vulnerability poses a significant risk. The Phoenix Contact QUINT4-UPS series is commonly used in power supply and uninterruptible power supply (UPS) systems that support critical operations. Compromise of login credentials via MITM attacks could allow attackers to manipulate UPS settings, disrupt power management, or gain a foothold into broader industrial control networks. This could lead to operational disruptions, safety hazards, and potential cascading failures in critical infrastructure. Confidentiality and integrity of credentials are directly impacted, increasing the risk of unauthorized access and control. Although availability is not directly affected by this vulnerability, the resulting unauthorized access could be leveraged to cause denial of service or sabotage. European organizations with remote or network-exposed management interfaces are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Immediately restrict network access to the QUINT4-UPS web frontend to trusted and segmented networks, minimizing exposure to potential MITM attackers. 2. Implement network-level encryption such as VPN tunnels or IPsec to protect websocket traffic if TLS is not yet supported by the device. 3. Monitor network traffic for unusual websocket connections or repeated login attempts indicative of interception or credential harvesting. 4. Engage with Phoenix Contact for firmware updates or patches that enable secure transport (TLS) for websocket communications and apply them promptly once available. 5. Employ strong authentication mechanisms and consider multi-factor authentication if supported to reduce the impact of credential compromise. 6. Conduct regular security audits and penetration tests focusing on industrial control system interfaces to identify similar weaknesses. 7. Educate operational technology (OT) staff on the risks of unencrypted management interfaces and the importance of network segmentation and secure communications. 8. If possible, disable remote web frontend access or replace it with more secure management methods until the vulnerability is remediated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.310Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee0d9d9bdcb328280b3ed3

Added to database: 10/14/2025, 8:45:17 AM

Last enriched: 10/14/2025, 8:46:00 AM

Last updated: 10/14/2025, 2:55:45 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats