Summary
Weidmueller industrial ethernet switches are affected by multiple vulnerabilities.
Weidmueller has released new firmwares of the affected products to fix the vulnerabilities.
Impact
Weidmueller industrial ethernet switches are vulnerable to multiple vulnerabilities. The security of the devices may be compromised. Further information can be found under vulnerability details.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1241290000 | IE-SW-PL10M-3GT-7TX | Firmware <V3.3.34 |
1286930000 | IE-SW-PL10MT-3GT-7TX | Firmware <V3.3.34 |
1241100000 | IE-SW-PL16M-16TX | Firmware <V3.4.32 |
1286820000 | IE-SW-PL16MT-16TX | Firmware <V3.4.32 |
1241320000 | IE-SW-PL18M-2GC-16TX | Firmware <V3.4.40 |
1286970000 | IE-SW-PL18MT-2GC-16TX | Firmware <V3.4.40 |
1504280000 | IE-SW-VL05M-5TX | Firmware <V3.6.32 |
1504310000 | IE-SW-VL05MT-5TX | Firmware <V3.6.32 |
1345240000 | IE-SW-VL08MT-5TX-1SC-2SCS | Firmware <V3.5.36 |
1344770000 | IE-SW-VL08MT-6TX-2SC | Firmware <V3.5.36 |
1241020000 | IE-SW-VL08MT-6TX-2SCS | Firmware <V3.5.36 |
1240990000 | IE-SW-VL08MT-6TX-2ST | Firmware <V3.5.36 |
1240940000 | IE-SW-VL08MT-8TX | Firmware <V3.5.36 |
Vulnerabilities
Expand / Collapse allThe devices are vulnerable to an authentication bypass due to flaws in the authorization mechanism. An unauthenticated remote attacker could exploit this weakness by performing brute-force attacks to guess valid credentials or by using MD5 collision techniques to forge authentication hashes, potentially compromising the device.
Due to missing authentication on a critical function of the devices an unauthenticated remote attacker can execute arbitrary commands, potentially enabling unauthorized upload or download of configuration files and leading to full system compromise.
An unauthenticated remote attacker can exploit a denial-of-service vulnerability in the device's web server functionality by sending a specially crafted HTTP request with a malicious header, potentially causing the server to crash or become unresponsive.
An unauthenticated remote attacker can exploit input validation in cmd services of the devices, allowing them to disrupt system operations and potentially cause a denial-of-service.
An unauthenticated remote attacker can exploit insufficient input validation to write data beyond the bounds of a buffer, potentially leading to a denial-of-service condition for the devices.
Remediation
Update to the new version as listed in the following table:
Product | Affected Version | Fixed Version |
---|---|---|
IE-SW-VL05M-5TX |
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 27.05.2025 11:00 | Initial version |
1.1.0 | 27.08.2025 12:00 | Update: CWE from CVE-2025-41652, Revision History |