Zurück zur Übersicht

Janitza: Vulnerability in Modbus interface of UMG 96-PA and UMG 96-PA-MID+

VDE-2025-094
Last update
24.11.2025 13:00
Published at
24.11.2025 13:00
Vendor(s)
Janitza electronics GmbH
External ID
VDE-2025-094
CSAF Document

Summary

A vulnerability in the devices UMG 96-PA and UMG 96-PA-MID+ enables an unauthenticated remote attacker to cause the device to become unavailable.

Impact

When exploiting the vulnerability the device becomes unavailable. It will not continue to work as expected including not responding to further requests. Additionally it's measurement functionalities stop working effectively making the device unavailable until the next restart.

Affected Product(s)

Model no. Product name Affected versions
1761.8057 UMG 96-PA Firmware <3.54
UMG 96-PA-MID+ Firmware <3.54

Vulnerabilities

Expand / Collapse all

Published
24.11.2025 12:33
Weakness
Improper Validation of Specified Type of Input (CWE-1287)
Summary

An unauthenticated remote attacker can send a specially crafted Modbus read command to the device which leads to a denial of service.

References

Mitigation

It is strongly advised to operate the device in a closed network protected by a suitable firewall. Network access to the device should be limited to only enable necessary components to access it. Special focus should be on the Modbus protocol as the core communication protocol of the device.

Remediation

It is strongly advised to update to the newest version. The vulnerability is fixed in version 3.54.

Acknowledgments

Janitza electronics GmbH thanks the following parties for their efforts:

  • CERTVDE for Coordination (see https://certvde.com/en/ )
  • Milence - Commercial Vehicle Charging Europe B.V. for Reporting

Revision History

Version Date Summary
1.0.0 24.11.2025 13:00 Initial release.