CVE-2025-41742

Sprecher Automations SPRECON-E-C,  SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-c:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-t3:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-02 11:15

Updated : 2026-02-23 17:15


NVD link : CVE-2025-41742

Mitre link : CVE-2025-41742

CVE.ORG link : CVE-2025-41742


JSON object : View

Products Affected

sprecher-automation

  • sprecon-e-p
  • sprecon-e-c_firmware
  • sprecon-e-c
  • sprecon-e-t3
  • sprecon-e-t3_firmware
  • sprecon-e-p_firmware
CWE
CWE-1394

Use of Default Cryptographic Key