A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://certvde.com/en/advisories/VDE-2025-054 |
|
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low privileged remote attacker with file access can replace a critical file used by the watchdog to get read, write and execute access to any file on the device after the watchdog has been initialized. | |
| Title | Phoenix Contact: File access due to the replacement of a critical file used by the watchdog | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-07-08T07:03:38.410Z
Updated: 2025-07-08T14:28:36.584Z
Reserved: 2025-04-16T11:17:48.307Z
Link: CVE-2025-41666
Updated: 2025-07-08T14:23:30.348Z
Status : Awaiting Analysis
Published: 2025-07-08T07:15:25.630
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-41666
No data.