Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7390: CWE-295 Improper Certificate Validation in Softing OPC UA C++ SDK

0
Critical
VulnerabilityCVE-2025-7390cvecve-2025-7390cwe-295
Published: Thu Aug 21 2025 (08/21/2025, 06:08:00 UTC)
Source: CVE Database V5
Vendor/Project: Softing
Product: OPC UA C++ SDK

Description

A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:24:55 UTC

Technical Analysis

CVE-2025-7390 is a critical security vulnerability identified in Softing's OPC UA C++ SDK version 6.40. The flaw arises from improper certificate validation (CWE-295) within the OPC UA HTTPS server implementation. Specifically, when the server endpoint is configured to allow only secure communication, a malicious client can bypass the client certificate trust check. This means that the server fails to properly verify the authenticity of client certificates, allowing unauthorized clients to establish a secure connection without valid credentials. OPC UA (Open Platform Communications Unified Architecture) is widely used in industrial automation and critical infrastructure for secure and reliable machine-to-machine communication. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical nature. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality and integrity (C:H/I:H) but not availability (A:N). Exploiting this vulnerability could allow attackers to impersonate legitimate clients, gain unauthorized access to sensitive operational data, manipulate control commands, or disrupt trust models within industrial control systems. No patches or fixes are currently published, and no known exploits have been observed in the wild. However, the potential impact on industrial environments is significant due to the critical role of OPC UA in secure communications.

Potential Impact

The impact of CVE-2025-7390 is substantial for organizations relying on Softing's OPC UA C++ SDK for secure communications in industrial automation, manufacturing, energy, and critical infrastructure sectors. Successful exploitation allows attackers to bypass client certificate authentication, leading to unauthorized access to sensitive operational data and control systems. This can result in data confidentiality breaches, unauthorized command execution, and potential manipulation or disruption of industrial processes. Given the criticality of OPC UA in supervisory control and data acquisition (SCADA) systems and other industrial control systems (ICS), this vulnerability could facilitate espionage, sabotage, or operational downtime. The lack of required privileges and user interaction lowers the barrier for exploitation, increasing risk. Organizations worldwide using affected versions may face increased risk of targeted attacks, especially those in sectors where OPC UA is prevalent. The absence of known exploits currently provides a window for proactive mitigation, but the critical CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Monitor Softing's official channels closely for the release of security patches addressing CVE-2025-7390 and apply them immediately upon availability. 2. Until patches are available, implement strict network segmentation to isolate OPC UA servers from untrusted networks and clients, limiting exposure. 3. Employ additional certificate validation mechanisms at the network or application layer, such as mutual TLS with external validation or hardware security modules (HSMs) to enforce certificate trust. 4. Conduct thorough audits of OPC UA server configurations to ensure endpoints are correctly set to require and validate client certificates. 5. Use intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous OPC UA traffic patterns indicative of unauthorized access attempts. 6. Enforce strict access controls and logging on OPC UA servers to monitor and respond to suspicious client connections. 7. Educate operational technology (OT) and security teams about this vulnerability and the importance of certificate validation in OPC UA communications. 8. Consider deploying compensating controls such as VPNs or secure gateways that add an additional layer of authentication and encryption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Softing
Date Reserved
2025-07-09T13:09:38.988Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a6ba0dad5a09ad000c04d7

Added to database: 8/21/2025, 6:17:49 AM

Last enriched: 3/27/2026, 6:24:55 PM

Last updated: 5/10/2026, 2:12:11 PM

Views: 261

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses