Cyber Posture

CVE-2025-41742

Critical

Published: 02 December 2025

Published
02 December 2025
Modified
23 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via…

more

remote maintenance.

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 requires changing default authenticators, including cryptographic keys, prior to first use, directly preventing exploitation of default keys for unauthorized remote access.

prevent

SC-12 mandates establishment and management of cryptographic keys in accordance with defined requirements, eliminating the risk of default keys enabling read, modify, and write access.

prevent

SI-2 ensures timely remediation of identified flaws like CVE-2025-41742 through patching or configuration updates as per the vendor advisory.

Security SummaryAI

CVE-2025-41742, published on 2025-12-02, is a critical vulnerability in Sprecher Automations' SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 products. It stems from the use of default cryptographic keys, enabling unauthorized access. The issue carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-1394.

An unauthorized remote attacker can exploit this vulnerability over the network with low complexity and no required privileges or user interaction. Successful exploitation allows the attacker to read, modify, and write projects and data, as well as access any device via remote maintenance, potentially leading to full compromise of confidentiality, integrity, and availability.

The vendor has issued a security advisory providing details on mitigation, available at https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2511042_de.pdf.

Details

CWE(s)

Affected Products

sprecher-automation
sprecon-e-c firmware
all versions
sprecher-automation
sprecon-e-p firmware
all versions
sprecher-automation
sprecon-e-t3 firmware
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability in SPRECON-E products uses default cryptographic keys, enabling remote attackers to gain unauthorized access without privileges over the network, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References