Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
|
| Vendors & Products |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
Tue, 02 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance. | |
| Title | Sprecher Automation: SPRECON-E series has a critical vulnerability due to the use of static cryptographic keys in system components | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-12-02T10:39:08.982Z
Updated: 2025-12-02T16:54:31.534Z
Reserved: 2025-04-16T11:17:48.321Z
Link: CVE-2025-41742
Updated: 2025-12-02T16:53:17.993Z
Status : Awaiting Analysis
Published: 2025-12-02T11:15:51.153
Modified: 2025-12-02T17:16:29.163
Link: CVE-2025-41742
No data.