Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41718: CWE-319 Cleartext Transmission of Sensitive Information in Murrelektronik Firmware Impact67 Pro 54630

0
High
VulnerabilityCVE-2025-41718cvecve-2025-41718cwe-319
Published: Tue Oct 14 2025 (10/14/2025, 08:25:52 UTC)
Source: CVE Database V5
Vendor/Project: Murrelektronik
Product: Firmware Impact67 Pro 54630

Description

A cleartext transmission of sensitive information vulnerability in the affected products allows an unauthorized remote attacker to gain login credentials and access the Web-UI.

AI-Powered Analysis

AILast updated: 10/14/2025, 08:46:57 UTC

Technical Analysis

CVE-2025-41718 identifies a vulnerability in the Murrelektronik Firmware Impact67 Pro 54630 where sensitive information, specifically login credentials, is transmitted in cleartext over the network. This weakness is categorized under CWE-319, which pertains to the cleartext transmission of sensitive data. The vulnerability allows an unauthenticated remote attacker to intercept these credentials by eavesdropping on network traffic, thereby gaining unauthorized access to the device's Web-UI. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality (C:H) without impacting integrity or availability. The firmware version affected is indicated as 0.0.0, which likely represents all current versions at the time of disclosure. The lack of encryption or secure communication protocols such as TLS/SSL in the firmware's management interface is the root cause. Although no exploits have been reported in the wild, the vulnerability's nature makes it a critical concern for environments relying on these devices for industrial control or automation. The vulnerability was published on October 14, 2025, with a CVSS v3.1 score of 7.5, reflecting its high severity. The absence of patches at the time of disclosure increases the urgency for mitigation through compensating controls.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a significant risk. Unauthorized access to the Web-UI of Impact67 Pro 54630 devices could lead to exposure of sensitive operational data and potential manipulation of industrial processes. This could result in operational disruptions, safety hazards, and intellectual property theft. The confidentiality breach could also facilitate lateral movement within networks, increasing the risk of broader compromise. Given the widespread use of Murrelektronik products in European industrial environments, the impact could extend to supply chain disruptions and economic losses. The vulnerability's exploitation does not require authentication or user interaction, making it easier for attackers to leverage. Although availability and integrity are not directly impacted, the unauthorized access could be a stepping stone for further attacks that might affect these aspects. The lack of encryption in communication channels undermines trust in device security and compliance with European data protection regulations such as GDPR if personal or sensitive data is involved.

Mitigation Recommendations

1. Immediately implement network segmentation to isolate Impact67 Pro 54630 devices from general IT networks, limiting exposure to potential attackers. 2. Deploy VPNs or secure tunnels (e.g., IPsec) to encrypt management traffic until firmware patches are available. 3. Monitor network traffic for unencrypted transmissions and unusual access patterns to detect potential interception attempts. 4. Enforce strict access control policies, including IP whitelisting and multi-factor authentication where possible, to reduce unauthorized access risk. 5. Engage with Murrelektronik to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 6. Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar weaknesses. 7. Train operational technology (OT) personnel on secure configuration and the risks of cleartext credential transmission. 8. Consider deploying intrusion detection systems (IDS) tailored for industrial protocols to alert on suspicious activities related to these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.313Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee0c499bdcb32828080e11

Added to database: 10/14/2025, 8:39:37 AM

Last enriched: 10/14/2025, 8:46:57 AM

Last updated: 10/15/2025, 7:09:42 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats