CVE-2025-41742
Published: 02 December 2025
Description
Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via…
more
remote maintenance.
Mitigating Controls (NIST 800-53 r5)AI
IA-5 requires changing default authenticators, including cryptographic keys, prior to first use, directly preventing exploitation of default keys for unauthorized remote access.
SC-12 mandates establishment and management of cryptographic keys in accordance with defined requirements, eliminating the risk of default keys enabling read, modify, and write access.
SI-2 ensures timely remediation of identified flaws like CVE-2025-41742 through patching or configuration updates as per the vendor advisory.
Security SummaryAI
CVE-2025-41742, published on 2025-12-02, is a critical vulnerability in Sprecher Automations' SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 products. It stems from the use of default cryptographic keys, enabling unauthorized access. The issue carries a CVSS 3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-1394.
An unauthorized remote attacker can exploit this vulnerability over the network with low complexity and no required privileges or user interaction. Successful exploitation allows the attacker to read, modify, and write projects and data, as well as access any device via remote maintenance, potentially leading to full compromise of confidentiality, integrity, and availability.
The vendor has issued a security advisory providing details on mitigation, available at https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2511042_de.pdf.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability in SPRECON-E products uses default cryptographic keys, enabling remote attackers to gain unauthorized access without privileges over the network, directly facilitating T1190: Exploit Public-Facing Application.