Back to overview

Endress+Hauser: Proline 10 Maintenance credentials may be exposed under certain conditions

VDE-2025-068
Last update
02/20/2026 10:00
Published at
09/02/2025 12:00
Vendor(s)
Endress+Hauser AG
External ID
VDE-2025-068
CSAF Document

Summary

A privilege escalation vulnerability has been identified in Endress+Hauser's Proline 10 devices. This flaw allows an authenticated user with Operator-level access to elevate their privileges and gain Maintenance-level access, potentially enabling unauthorized configuration changes.

Endress+Hauser has released a security update addressing this issue.

Impact

Successful exploitation of this vulnerability may allow an attacker to perform vertical privilege escalation, gaining unauthorized access to Maintenance-level functions. As a result, the attacker could:
• Modify all Maintenance parameters
• Change device settings
• Initiate a device reset, potentially causing operational downtime
• Restore the device to its factory default settings
• Reconfigure non-critical diagnostic parameters
• Disable Bluetooth communication
• Alter the 4–20 mA analog output range

Affected Product(s)

Model no. Product name Affected versions
Promag 10 Firmware <01.00.02
Promag 10 Firmware <01.00.06
Promag 10 Firmware <01.00.06
Promass 10 Firmware <01.00.06
Promass 10 Firmware <01.00.02
Promass 10 Firmware <01.00.06

Vulnerabilities

Expand / Collapse all

Published
02/20/2026 10:54
Weakness
Insertion of Sensitive Information into Log File (CWE-532)
Summary

A low-privileged attacker in bluetooth range may be able to access the password of a higher-privilege user (Maintenance) by viewing the device’s event log. This vulnerability could allow the Operator to authenticate as the Maintenance user, thereby gaining unauthorized access to sensitive configuration settings and the ability to modify device parameters.

References

Mitigation

If an immediate firmware update is not feasible, it is recommended to disable the device's Bluetooth communication when not actively in use. This significantly reduces the risk of unauthorized access by eliminating the key vector through which the vulnerability could be exploited.

Remediation

Endress+Hauser has released updated firmware versions for the affected devices that resolve this vulnerability. Customers are encouraged to update their devices to the latest firmware version as soon as possible.
For assistance with the update process, please contact your local Endress+Hauser service center.

Acknowledgments

Endress+Hauser AG thanks the following parties for their efforts:

Revision History

Version Date Summary
1.0.0 09/02/2025 12:00 Initial version
1.0.1 02/20/2026 10:00 fixed typo in alias