{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13901","assignerOrgId":"076d1eb6-cfab-4401-b34d-6dfc2a413bdb","state":"PUBLISHED","assignerShortName":"schneider","dateReserved":"2025-12-02T16:20:27.551Z","datePublished":"2026-03-10T17:02:22.998Z","dateUpdated":"2026-03-10T17:25:20.028Z"},"containers":{"cna":{"providerMetadata":{"orgId":"076d1eb6-cfab-4401-b34d-6dfc2a413bdb","shortName":"schneider","dateUpdated":"2026-03-10T17:12:53.896Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-404","description":"CWE-404 Improper Resource Shutdown or Release","type":"CWE"}]}],"affected":[{"vendor":"Schneider Electric","product":"Modicon M241/M251","versions":[{"status":"affected","version":"Versions prior to 5.4.13.12"}],"defaultStatus":"unaffected"},{"vendor":"Schneider Electric","product":"Modicon M262","versions":[{"status":"affected","version":"Versions prior to 5.4.10.12"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels.","supportingMedia":[{"type":"text/html","base64":false,"value":"CWE-404 Improper Resource Shutdown or Release vulnerability exists that could cause partial Denial of Service on Machine Expert protocol when an unauthenticated attacker sends malicious payload to occupy active communication channels."}]}],"references":[{"url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-069-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-069-01.pdf"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"MEDIUM","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N"}}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-10T17:24:36.387715Z","id":"CVE-2025-13901","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-10T17:25:20.028Z"}}]}}