Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41737: CWE-284 Improper Access Control in METZ CONNECT Energy-Controlling EWIO2-M

0
High
VulnerabilityCVE-2025-41737cvecve-2025-41737cwe-284
Published: Tue Nov 18 2025 (11/18/2025, 10:18:44 UTC)
Source: CVE Database V5
Vendor/Project: METZ CONNECT
Product: Energy-Controlling EWIO2-M

Description

Due to webserver misconfiguration an unauthenticated remote attacker is able to read the source of php modules.

AI-Powered Analysis

AILast updated: 11/18/2025, 10:44:30 UTC

Technical Analysis

CVE-2025-41737 is a vulnerability classified under CWE-284 (Improper Access Control) found in the METZ CONNECT Energy-Controlling EWIO2-M device. The root cause is a misconfiguration in the embedded webserver that allows unauthenticated remote attackers to access and read the source code of PHP modules. This exposure can reveal sensitive information such as hardcoded credentials, internal logic, or configuration details that could facilitate further attacks. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation (network attack vector, low complexity) and the high confidentiality impact, while integrity and availability remain unaffected. No patches are currently listed, and no exploits have been observed in the wild, but the potential for information leakage is significant. The affected product is used in energy management environments, which are critical infrastructure sectors. The vulnerability was reserved in April 2025 and published in November 2025 by CERTVDE, indicating a recent discovery. The lack of authentication requirements and the direct exposure of source code make this a serious concern for organizations relying on this device for energy control and monitoring.

Potential Impact

The primary impact of CVE-2025-41737 is the compromise of confidentiality due to unauthorized disclosure of PHP source code. This can lead to leakage of sensitive information such as credentials, encryption keys, or proprietary algorithms embedded in the code. For European organizations, especially those in the energy sector, this could facilitate further targeted attacks, including unauthorized access or manipulation of energy control systems. Although integrity and availability are not directly affected, the exposure of source code increases the attack surface and could enable attackers to craft more effective exploits. Given the critical nature of energy infrastructure in Europe, exploitation could have cascading effects on operational security and compliance with regulatory requirements such as NIS2. The vulnerability's remote and unauthenticated nature means attackers can exploit it without insider access, increasing the risk of widespread compromise if the device is internet-facing or accessible within corporate networks.

Mitigation Recommendations

To mitigate CVE-2025-41737, organizations should immediately review and correct the webserver configuration on the EWIO2-M devices to ensure PHP source code files are not accessible via HTTP requests. This typically involves disabling directory listing, properly configuring the webserver to process PHP files rather than serving them as plain text, and restricting access to sensitive directories. Network segmentation should be enforced to limit access to the device's management interface only to trusted internal networks. Monitoring and logging access attempts to the device can help detect exploitation attempts. Since no official patches are currently available, organizations should engage with METZ CONNECT for updates and apply any forthcoming security patches promptly. Additionally, conducting a security audit of all similar devices in the environment to identify misconfigurations and applying secure deployment best practices is recommended. Implementing strict access controls and considering compensating controls such as web application firewalls can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.320Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c4a8a8ab8e3b581406714

Added to database: 11/18/2025, 10:29:30 AM

Last enriched: 11/18/2025, 10:44:30 AM

Last updated: 11/18/2025, 6:22:06 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats