Vulnerabilites related to Wattsense - Wattsense Bridge
CVE-2025-26409 (GCVE-0-2025-26409)
Vulnerability from cvelistv5
Published
2025-02-11 09:15
Modified
2025-03-17 16:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A serial interface can be accessed with physical access to the PCB of Wattsense Bridge devices. After connecting to the interface, access to the bootloader is possible, as well as a Linux login prompt. The bootloader access can be used to gain a root shell on the device. This issue is fixed in recent firmware versions BSP >= 6.4.1.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wattsense | Wattsense Bridge |
Version: 0 < 6.4.1 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-26409", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T14:38:08.176508Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1299", "description": "CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-17T16:40:45.172Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Wattsense Bridge", "vendor": "Wattsense", "versions": [ { "lessThan": "6.4.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Constantin Schieber-Kn\u00f6bl | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Stefan Schweighofer | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Steffen Robertz | SEC Consult Vulnerability Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A serial interface can be accessed with physical access to the PCB of Wattsense Bridge devices. After connecting to the interface, access to the bootloader is possible, as well as a Linux login prompt. The bootloader access can be used to gain a root shell on the device. This issue is fixed in\u0026nbsp;recent firmware versions BSP \u0026gt;= 6.4.1." } ], "value": "A serial interface can be accessed with physical access to the PCB of Wattsense Bridge devices. After connecting to the interface, access to the bootloader is possible, as well as a Linux login prompt. The bootloader access can be used to gain a root shell on the device. This issue is fixed in\u00a0recent firmware versions BSP \u003e= 6.4.1." } ], "impacts": [ { "capecId": "CAPEC-180", "descriptions": [ { "lang": "en", "value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1299", "description": "CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-1191", "description": "CWE-1191 On-Chip Debug and Test Interface With Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T09:15:30.131Z", "orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "shortName": "SEC-VLab" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://r.sec-consult.com/wattsense" }, { "tags": [ "release-notes" ], "url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in recent firmware versions BSP \u0026gt;= 6.4.1." } ], "value": "This issue is fixed in recent firmware versions BSP \u003e= 6.4.1." } ], "source": { "discovery": "EXTERNAL" }, "title": "Access to Bootloader and Shell Over Serial Interface", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "assignerShortName": "SEC-VLab", "cveId": "CVE-2025-26409", "datePublished": "2025-02-11T09:15:30.131Z", "dateReserved": "2025-02-10T07:48:38.352Z", "dateUpdated": "2025-03-17T16:40:45.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26408 (GCVE-0-2025-26408)
Vulnerability from cvelistv5
Published
2025-02-11 09:14
Modified
2025-03-22 14:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1191 - On-Chip Debug and Test Interface With Improper Access Control
Summary
The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wattsense | Wattsense Bridge |
Version: * |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-26408", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T14:40:43.535274Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-22T14:41:30.878Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Wattsense Bridge", "vendor": "Wattsense", "versions": [ { "status": "affected", "version": "*" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Constantin Schieber-Kn\u00f6bl | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Stefan Schweighofer | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Steffen Robertz | SEC Consult Vulnerability Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device\u0027s firmware. All known versions are affected.\u003cbr\u003e\u003cbr\u003e" } ], "value": "The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device\u0027s firmware. All known versions are affected." } ], "impacts": [ { "capecId": "CAPEC-702", "descriptions": [ { "lang": "en", "value": "CAPEC-702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1191", "description": "CWE-1191 On-Chip Debug and Test Interface With Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T09:14:28.700Z", "orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "shortName": "SEC-VLab" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://r.sec-consult.com/wattsense" }, { "tags": [ "release-notes" ], "url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe device is meant to be installed at a restricted access physical location according to the vendor and exploitation requires\u0026nbsp;\u003c/span\u003emore attacker knowledge and higher physical access. The issue will be put in the backlog of the Wattsense team." } ], "value": "The device is meant to be installed at a restricted access physical location according to the vendor and exploitation requires\u00a0more attacker knowledge and higher physical access. The issue will be put in the backlog of the Wattsense team." } ], "source": { "discovery": "EXTERNAL" }, "title": "Unprotected JTAG Interface", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "assignerShortName": "SEC-VLab", "cveId": "CVE-2025-26408", "datePublished": "2025-02-11T09:14:28.700Z", "dateReserved": "2025-02-10T07:48:38.352Z", "dateUpdated": "2025-03-22T14:41:30.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26411 (GCVE-0-2025-26411)
Vulnerability from cvelistv5
Published
2025-02-11 09:21
Modified
2025-03-14 17:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface to be able to conduct this attack. This issue is fixed in recent firmware versions BSP >= 6.1.0.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wattsense | Wattsense Bridge |
Version: 0 < 6.1.0 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-26411", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T14:33:44.192168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-14T17:16:02.468Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Wattsense Bridge", "vendor": "Wattsense", "versions": [ { "lessThan": "6.1.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Constantin Schieber-Kn\u00f6bl | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Stefan Schweighofer | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Steffen Robertz | SEC Consult Vulnerability Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface\u0026nbsp;to be able to conduct this attack. This issue is fixed in recent firmware versions BSP \u0026gt;= 6.1.0." } ], "value": "An authenticated attacker is able to use the Plugin Manager of the web interface of the Wattsense Bridge devices to upload malicious Python files to the device. This enables an attacker to gain remote root access to the device. An attacker needs a valid user account on the Wattsense web interface\u00a0to be able to conduct this attack. This issue is fixed in recent firmware versions BSP \u003e= 6.1.0." } ], "impacts": [ { "capecId": "CAPEC-175", "descriptions": [ { "lang": "en", "value": "CAPEC-175 Code Inclusion" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T09:21:16.571Z", "orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "shortName": "SEC-VLab" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://r.sec-consult.com/wattsense" }, { "tags": [ "release-notes" ], "url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in recent firmware versions BSP \u0026gt;= 6.1.0." } ], "value": "This issue is fixed in recent firmware versions BSP \u003e= 6.1.0." } ], "source": { "discovery": "EXTERNAL" }, "title": "Authenticated Arbitrary Python File Upload via Plugin Manager", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "assignerShortName": "SEC-VLab", "cveId": "CVE-2025-26411", "datePublished": "2025-02-11T09:21:16.571Z", "dateReserved": "2025-02-10T07:48:38.352Z", "dateUpdated": "2025-03-14T17:16:02.468Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26410 (GCVE-0-2025-26410)
Vulnerability from cvelistv5
Published
2025-02-11 09:20
Modified
2025-03-18 18:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-798 - Use of Hard-coded Credentials
Summary
The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP >= 6.4.1.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wattsense | Wattsense Bridge |
Version: 0 < 6.4.1 |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-26410", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-11T14:35:57.904824Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-18T18:27:29.653Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Wattsense Bridge", "vendor": "Wattsense", "versions": [ { "lessThan": "6.4.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Constantin Schieber-Kn\u00f6bl | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Stefan Schweighofer | SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Steffen Robertz | SEC Consult Vulnerability Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP \u0026gt;= 6.4.1.\u003cbr\u003e" } ], "value": "The firmware of all Wattsense Bridge devices contain the same hard-coded user and root credentials. The user password can be easily recovered via password cracking attempts. The recovered credentials can be used to log into the device via the login shell that is exposed by the serial interface. The backdoor user has been removed in firmware BSP \u003e= 6.4.1." } ], "impacts": [ { "capecId": "CAPEC-653", "descriptions": [ { "lang": "en", "value": "CAPEC-653 Use of Known Operating System Credentials" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-11T09:20:22.708Z", "orgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "shortName": "SEC-VLab" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://r.sec-consult.com/wattsense" }, { "tags": [ "release-notes" ], "url": "https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in recent firmware versions BSP \u0026gt;= 6.4.1." } ], "value": "This issue is fixed in recent firmware versions BSP \u003e= 6.4.1." } ], "source": { "discovery": "EXTERNAL" }, "title": "Weak Hard-coded Credentials", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "551230f0-3615-47bd-b7cc-93e92e730bbf", "assignerShortName": "SEC-VLab", "cveId": "CVE-2025-26410", "datePublished": "2025-02-11T09:20:22.708Z", "dateReserved": "2025-02-10T07:48:38.352Z", "dateUpdated": "2025-03-18T18:27:29.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }