Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance.
References
| Link | Resource |
|---|---|
| https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2511042_de.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-02 11:15
Updated : 2026-02-23 17:15
NVD link : CVE-2025-41742
Mitre link : CVE-2025-41742
CVE.ORG link : CVE-2025-41742
JSON object : View
Products Affected
sprecher-automation
- sprecon-e-p
- sprecon-e-c_firmware
- sprecon-e-c
- sprecon-e-t3
- sprecon-e-t3_firmware
- sprecon-e-p_firmware
CWE
CWE-1394
Use of Default Cryptographic Key
