Zurück zur Übersicht

Weidmueller: Industrial ethernet switches are affected by multiple vulnerabilities

VDE-2025-044
Last update
27.08.2025 12:00
Published at
27.05.2025 11:00
Vendor(s)
Weidmueller Interface GmbH & Co. KG
External ID
VDE-2025-044
CSAF Document

Summary

Weidmueller industrial ethernet switches are affected by multiple vulnerabilities.

Weidmueller has released new firmwares of the affected products to fix the vulnerabilities.

Impact

Weidmueller industrial ethernet switches are vulnerable to multiple vulnerabilities. The security of the devices may be compromised. Further information can be found under vulnerability details.

Affected Product(s)

Model no. Product name Affected versions
1241290000 IE-SW-PL10M-3GT-7TX Firmware <V3.3.34
1286930000 IE-SW-PL10MT-3GT-7TX Firmware <V3.3.34
1241100000 IE-SW-PL16M-16TX Firmware <V3.4.32
1286820000 IE-SW-PL16MT-16TX Firmware <V3.4.32
1241320000 IE-SW-PL18M-2GC-16TX Firmware <V3.4.40
1286970000 IE-SW-PL18MT-2GC-16TX Firmware <V3.4.40
1504280000 IE-SW-VL05M-5TX Firmware <V3.6.32
1504310000 IE-SW-VL05MT-5TX Firmware <V3.6.32
1345240000 IE-SW-VL08MT-5TX-1SC-2SCS Firmware <V3.5.36
1344770000 IE-SW-VL08MT-6TX-2SC Firmware <V3.5.36
1241020000 IE-SW-VL08MT-6TX-2SCS Firmware <V3.5.36
1240990000 IE-SW-VL08MT-6TX-2ST Firmware <V3.5.36
1240940000 IE-SW-VL08MT-8TX Firmware <V3.5.36

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Use of Weak Hash (CWE-328)
Summary

The devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.

References

Published
22.09.2025 14:58
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.

References

Published
22.09.2025 14:58
Weakness
Insufficient Resource Pool (CWE-410)
Summary

An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive.

References

Published
22.09.2025 14:58
Weakness
Improper Validation of Specified Type of Input (CWE-1287)
Summary

An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.

References

Published
22.09.2025 14:58
Weakness
Out-of-bounds Write (CWE-787)
Summary

An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.

References

Remediation

Update to the new version as listed in the following table:

Product Affected Version Fixed Version
IE-SW-VL05M-5TX

Revision History

Version Date Summary
1.0.0 27.05.2025 11:00 Initial version
1.1.0 27.08.2025 12:00 Update: CWE from CVE-2025-41652, Revision History