{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9495","assignerOrgId":"e24e6442-3ae1-4538-a7b8-7ac95586db8f","state":"PUBLISHED","assignerShortName":"Carrier","dateReserved":"2025-08-26T17:40:58.043Z","datePublished":"2025-09-23T01:16:53.619Z","dateUpdated":"2025-09-23T13:33:47.319Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Vitogate 300","vendor":"Viessmann","versions":[{"lessThan":"3.0.0.0","status":"affected","version":"1","versionType":"date"}]}],"credits":[{"lang":"en","type":"reporter","value":"Souvik Kandar of MicroSec (microsec.io)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device.<br>"}],"value":"The Vitogate 300 web interface fails to enforce proper server-side authentication and relies on frontend-based authentication controls. This allows an attacker to simply modify HTML elements in the browser’s developer tools to bypass login restrictions. By removing specific UI elements, an attacker can reveal the hidden administration menu, giving them full control over the device."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":8.7,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-602","description":"CWE-602 Client-Side Enforcement of Server-Side Security","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e24e6442-3ae1-4538-a7b8-7ac95586db8f","shortName":"Carrier","dateUpdated":"2025-09-23T01:16:53.619Z"},"references":[{"url":"https://https://www.corporate.carrier.com/product-security/advisories-resources/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p></p><p>These\nvulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. </p>\n\n<p>Customers\nare strongly encouraged to upgrade by downloading software version 3.1.0.1 or newer at the\n<a target=\"_blank\" rel=\"nofollow\" href=\"https://connectivity.viessmann-climatesolutions.com/gb/mp-fp/vitogate/vitogate-300-bn-mb.html\">Vitogate\n300 website.</a></p><p></p>"}],"value":"These\nvulnerabilities have been fixed with Vitogate 300 software version 3.1.0.1. \n\n\n\nCustomers\nare strongly encouraged to upgrade by downloading software version 3.1.0.1 or newer at the\nVitogate\n300 website."}],"source":{"discovery":"EXTERNAL"},"title":"Viessmann Vitogate 300 Authentication Bypass","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-23T13:33:41.544746Z","id":"CVE-2025-9495","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-23T13:33:47.319Z"}}]}}