{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-41708","assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","state":"PUBLISHED","assignerShortName":"CERTVDE","dateReserved":"2025-04-16T11:17:48.311Z","datePublished":"2025-09-08T06:38:50.386Z","dateUpdated":"2025-09-08T18:04:06.675Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CC612","vendor":"Bender","versions":[{"lessThanOrEqual":"all versions","status":"affected","version":"0.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"CC613","vendor":"Bender","versions":[{"lessThanOrEqual":"all versions","status":"affected","version":"0.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"ICC15xx","vendor":"Bender","versions":[{"lessThanOrEqual":"all versions","status":"affected","version":"0.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"ICC16xx","vendor":"Bender","versions":[{"lessThanOrEqual":"all versions","status":"affected","version":"0.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"ICC13xx","vendor":"Bender","versions":[{"lessThanOrEqual":"all versions","status":"affected","version":"0.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Dr. Matthias Kesenheimer by SySS GmbH"},{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Sebastian Hamann by SySS GmbH"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Due to an unsecure default configuration HTTP is used instead of HTTPS for the web interface. An unauthenticated attacker on the same network could exploit this to learn sensitive data during transmission.<br>"}],"value":"Due to an unsecure default configuration HTTP is used instead of HTTPS for the web interface. An unauthenticated attacker on the same network could exploit this to learn sensitive data during transmission."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319 Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE","dateUpdated":"2025-09-08T06:38:50.386Z"},"references":[{"url":"https://certvde.com/de/advisories/VDE-2025-084"}],"source":{"advisory":"VDE-2025-084","defect":["CERT@VDE#641854"],"discovery":"UNKNOWN"},"title":"Cleartext Transmission of Sensitive Data via Insecure HTTP Web Interface","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-08T18:03:02.845880Z","id":"CVE-2025-41708","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-08T18:04:06.675Z"}}]}}