CVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
AI Analysis
Technical Summary
CVE-2025-7390 is a critical vulnerability identified in the Softing Industrial Automation GmbH OPC UA C++ SDK version 6.40. The flaw stems from improper certificate validation (CWE-295) in the OPC UA HTTPS server implementation. Specifically, when the server endpoint is configured to allow only secure communication, a malicious client can bypass the client certificate trust check. This means that the server fails to properly verify the authenticity and trustworthiness of client certificates during the TLS handshake, allowing an attacker to impersonate a trusted client without possessing a valid certificate. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible for remote attackers. The impact is severe, with high confidentiality and integrity consequences (C:H/I:H/A:N), as unauthorized clients can gain access to sensitive industrial automation data or manipulate control commands. Given the critical CVSS score of 9.1, exploitation could lead to unauthorized disclosure of sensitive information and unauthorized control over industrial processes. The vulnerability affects the OPC UA C++ SDK version 6.40, a widely used software development kit for implementing OPC UA servers and clients in industrial automation environments. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that affected organizations should prioritize mitigation and monitoring. OPC UA (Open Platform Communications Unified Architecture) is a key protocol in industrial control systems (ICS) for secure and reliable data exchange between devices and control systems. This vulnerability undermines the fundamental security guarantees of OPC UA, potentially exposing critical infrastructure to cyberattacks.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a significant risk. OPC UA is widely adopted in European industrial automation environments due to its interoperability and security features. Exploitation could allow attackers to bypass authentication controls, leading to unauthorized access to control systems, data leakage, or manipulation of industrial processes. This could result in operational disruptions, safety hazards, financial losses, and damage to reputation. Given the increasing digitalization and Industry 4.0 initiatives across Europe, the reliance on OPC UA-based systems is growing, amplifying the potential impact. Furthermore, regulatory frameworks such as NIS2 Directive and GDPR emphasize the protection of critical infrastructure and personal data, making exploitation of this vulnerability a compliance risk as well. The lack of known exploits currently provides a window for proactive defense, but the critical severity demands immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting OPC UA HTTPS endpoints that rely solely on client certificate authentication until a patch or update is available. 2. Implement network segmentation and strict firewall rules to limit access to OPC UA servers only to trusted network segments and known clients. 3. Employ additional layers of authentication and authorization at the application level to compensate for the certificate validation weakness. 4. Monitor network traffic for anomalous connections or unexpected client certificates attempting to connect to OPC UA servers. 5. Engage with Softing Industrial Automation GmbH for updates on patches or security advisories and apply them promptly once released. 6. Conduct a thorough inventory of all OPC UA deployments using the affected SDK version and prioritize remediation efforts based on criticality. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned for OPC UA protocol anomalies. 8. Educate operational technology (OT) and IT security teams about this vulnerability to enhance vigilance and incident response readiness.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Finland, Poland, Spain
CVE-2025-7390: CWE-295 Improper Certificate Validation in Softing Industrial Automation GmbH OPC UA C++ SDK
Description
A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
AI-Powered Analysis
Technical Analysis
CVE-2025-7390 is a critical vulnerability identified in the Softing Industrial Automation GmbH OPC UA C++ SDK version 6.40. The flaw stems from improper certificate validation (CWE-295) in the OPC UA HTTPS server implementation. Specifically, when the server endpoint is configured to allow only secure communication, a malicious client can bypass the client certificate trust check. This means that the server fails to properly verify the authenticity and trustworthiness of client certificates during the TLS handshake, allowing an attacker to impersonate a trusted client without possessing a valid certificate. The vulnerability is network exploitable (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible for remote attackers. The impact is severe, with high confidentiality and integrity consequences (C:H/I:H/A:N), as unauthorized clients can gain access to sensitive industrial automation data or manipulate control commands. Given the critical CVSS score of 9.1, exploitation could lead to unauthorized disclosure of sensitive information and unauthorized control over industrial processes. The vulnerability affects the OPC UA C++ SDK version 6.40, a widely used software development kit for implementing OPC UA servers and clients in industrial automation environments. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that affected organizations should prioritize mitigation and monitoring. OPC UA (Open Platform Communications Unified Architecture) is a key protocol in industrial control systems (ICS) for secure and reliable data exchange between devices and control systems. This vulnerability undermines the fundamental security guarantees of OPC UA, potentially exposing critical infrastructure to cyberattacks.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a significant risk. OPC UA is widely adopted in European industrial automation environments due to its interoperability and security features. Exploitation could allow attackers to bypass authentication controls, leading to unauthorized access to control systems, data leakage, or manipulation of industrial processes. This could result in operational disruptions, safety hazards, financial losses, and damage to reputation. Given the increasing digitalization and Industry 4.0 initiatives across Europe, the reliance on OPC UA-based systems is growing, amplifying the potential impact. Furthermore, regulatory frameworks such as NIS2 Directive and GDPR emphasize the protection of critical infrastructure and personal data, making exploitation of this vulnerability a compliance risk as well. The lack of known exploits currently provides a window for proactive defense, but the critical severity demands immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting OPC UA HTTPS endpoints that rely solely on client certificate authentication until a patch or update is available. 2. Implement network segmentation and strict firewall rules to limit access to OPC UA servers only to trusted network segments and known clients. 3. Employ additional layers of authentication and authorization at the application level to compensate for the certificate validation weakness. 4. Monitor network traffic for anomalous connections or unexpected client certificates attempting to connect to OPC UA servers. 5. Engage with Softing Industrial Automation GmbH for updates on patches or security advisories and apply them promptly once released. 6. Conduct a thorough inventory of all OPC UA deployments using the affected SDK version and prioritize remediation efforts based on criticality. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned for OPC UA protocol anomalies. 8. Educate operational technology (OT) and IT security teams about this vulnerability to enhance vigilance and incident response readiness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Softing
- Date Reserved
- 2025-07-09T13:09:38.988Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68a6ba0dad5a09ad000c04d7
Added to database: 8/21/2025, 6:17:49 AM
Last enriched: 8/21/2025, 6:32:49 AM
Last updated: 8/21/2025, 7:31:49 AM
Views: 4
Related Threats
CVE-2025-8895: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in cozmoslabs WP Webhooks – Automate repetitive tasks by creating powerful automation workflows directly within WordPress
CriticalCVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumCVE-2025-48355: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in ProveSource LTD ProveSource Social Proof
MediumCVE-2025-57832
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.