The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Sauter Sauter ey-modulo 5 Devices Sauter modulo 6 Devices | |
| Vendors & Products | Sauter Sauter ey-modulo 5 Devices Sauter modulo 6 Devices | 
Wed, 22 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 22 Oct 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices. | |
| Title | Sauter: Hard-coded Authentication Credentials | |
| Weaknesses | CWE-798 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-10-22T06:58:31.679Z
Updated: 2025-10-22T13:30:10.827Z
Reserved: 2025-04-16T11:17:48.317Z
Link: CVE-2025-41722
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-22T13:30:01.031Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-22T07:15:33.640
Modified: 2025-10-22T21:12:48.953
Link: CVE-2025-41722
 Redhat
                        Redhat
                    No data.