Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41711: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in Janitza UMG 96RM-E 24V(5222063)

0
Medium
VulnerabilityCVE-2025-41711cvecve-2025-41711cwe-327
Published: Tue Mar 10 2026 (03/10/2026, 08:26:48 UTC)
Source: CVE Database V5
Vendor/Project: Janitza
Product: UMG 96RM-E 24V(5222063)

Description

CVE-2025-41711 is a medium severity vulnerability affecting the Janitza UMG 96RM-E 24V(5222063) device. It involves the use of a broken or risky cryptographic algorithm (CWE-327) that allows unauthenticated remote attackers to extract password hashes from firmware images. These hashes can then be brute forced to recover plaintext passwords of accounts with limited access. The vulnerability does not require authentication or user interaction and has no known exploits in the wild as of now. The impact is limited to confidentiality as integrity and availability are not affected. Organizations using this device should be aware of the risk of credential compromise through offline brute forcing. No patches are currently available, so mitigation focuses on limiting exposure and monitoring. Countries with significant deployments of Janitza products, especially in industrial and energy sectors, are at higher risk. The CVSS score is 5. 3, reflecting a medium severity level due to ease of exploitation but limited impact scope.

AI-Powered Analysis

AILast updated: 03/10/2026, 08:49:05 UTC

Technical Analysis

CVE-2025-41711 identifies a cryptographic weakness in the Janitza UMG 96RM-E 24V(5222063) energy metering device. The vulnerability arises from the use of a broken or risky cryptographic algorithm (classified under CWE-327), which is employed to protect password hashes stored within the device's firmware images. An unauthenticated remote attacker can obtain these firmware images, extract the password hashes, and perform offline brute force attacks to recover plaintext passwords. These passwords correspond to accounts with limited access privileges on the device. The vulnerability does not require any authentication or user interaction, making it accessible to remote attackers without prior credentials. However, the impact is confined to confidentiality as the attacker gains potential access to account credentials but cannot directly affect device integrity or availability. The CVSS v3.1 base score is 5.3, indicating medium severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). No patches or firmware updates have been published yet to address this issue. The vulnerability was reserved in April 2025 and published in March 2026. Janitza devices are commonly used in industrial, energy management, and critical infrastructure environments, which raises concerns about potential downstream risks if credentials are compromised. No known exploits have been reported in the wild, but the risk of offline brute forcing remains due to weak cryptographic protections.

Potential Impact

The primary impact of CVE-2025-41711 is the potential compromise of account credentials on Janitza UMG 96RM-E devices. Successful brute forcing of extracted password hashes can lead to unauthorized access to device management interfaces, even if only for accounts with limited privileges. This could enable attackers to gather sensitive operational data, modify configurations, or use the device as a foothold for further network intrusion. While the vulnerability does not directly affect device integrity or availability, compromised credentials can facilitate lateral movement within industrial or energy management networks, potentially leading to more severe attacks. Organizations relying on these devices in critical infrastructure sectors face increased risk of espionage, data leakage, or disruption through indirect means. The ease of exploitation (no authentication or user interaction needed) combined with the widespread use of Janitza products in energy and industrial markets amplifies the threat. However, the absence of known exploits in the wild and the medium CVSS score suggest the threat is moderate but should not be underestimated.

Mitigation Recommendations

1. Limit network exposure of Janitza UMG 96RM-E devices by placing them behind firewalls and restricting access to trusted management networks only. 2. Monitor network traffic and device logs for unusual access attempts or brute force activities targeting device management interfaces. 3. Employ strong, unique passwords for all accounts on the device and change default credentials immediately. 4. Regularly check for firmware updates or security advisories from Janitza and apply patches promptly once available. 5. If firmware images are obtained for legitimate purposes, verify their integrity and avoid distribution to unauthorized parties to reduce risk of hash extraction. 6. Implement network segmentation to isolate critical infrastructure devices and limit lateral movement in case of credential compromise. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior related to these devices. 8. Conduct periodic security assessments and penetration tests focusing on industrial control systems and energy management devices to identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.311Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69afd786ea502d3aa827b177

Added to database: 3/10/2026, 8:34:14 AM

Last enriched: 3/10/2026, 8:49:05 AM

Last updated: 3/10/2026, 9:39:26 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses