Sprecher Automations SPRECON-E series uses default cryptographic keys that allow an unprivileged remote attacker to access all encrypted communications, thereby compromising confidentiality and integrity.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
|
| Vendors & Products |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-t3 |
Tue, 02 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sprecher Automations SPRECON-E series uses default cryptographic keys that allow an unprivileged remote attacker to access all encrypted communications, thereby compromising confidentiality and integrity. | |
| Title | Sprecher Automation: SPRECON-E series has static default key material for TLS connections | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-12-02T10:38:47.489Z
Updated: 2025-12-02T16:54:47.037Z
Reserved: 2025-04-16T11:17:48.321Z
Link: CVE-2025-41744
Updated: 2025-12-02T16:53:20.325Z
Status : Awaiting Analysis
Published: 2025-12-02T11:15:51.760
Modified: 2025-12-02T17:16:29.163
Link: CVE-2025-41744
No data.