Cyber Posture

CVE-2025-25270

Critical

Published: 08 July 2025

Published
08 July 2025
Modified
11 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0113 78.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25270 is a critical-severity Improper Control of Dynamically-Managed Code Resources (CWE-913) vulnerability in Phoenixcontact Charx Sec-3000 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-3 (Configuration Change Control) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the critical flaw allowing unauthenticated remote attackers to alter device configurations for root RCE.

prevent

Monitors and controls network communications at boundaries to block unauthenticated remote access to the vulnerable configuration interface.

prevent

Requires authorization, documentation, testing, and verification of configuration changes to prevent unauthorized alterations leading to RCE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated network RCE on a public-facing device maps cleanly to initial access via public application exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

Deeper analysisAI

CVE-2025-25270, published on 2025-07-08, is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) associated with CWE-913. It enables an unauthenticated remote attacker to alter the device configuration in a manner that leads to remote code execution as root, but only under specific configurations.

The vulnerability can be exploited by any unauthenticated attacker with network access to the affected device. Exploitation requires low complexity, no privileges, and no user interaction. Successful attacks grant remote code execution privileges as root, resulting in high impacts to confidentiality, integrity, and availability.

For mitigation details, refer to the advisory at https://certvde.com/de/advisories/VDE-2025-019.

Details

CWE(s)

Affected Products

phoenixcontact
charx sec-3000 firmware
≤ 1.7.3
phoenixcontact
charx sec-3050 firmware
≤ 1.7.3
phoenixcontact
charx sec-3100 firmware
≤ 1.7.3
phoenixcontact
charx sec-3150 firmware
≤ 1.7.3

CVEs Like This One

CVE-2025-24003Same product: Phoenixcontact Charx Sec-3000
CVE-2025-25271Same product: Phoenixcontact Charx Sec-3000
CVE-2025-25269Same product: Phoenixcontact Charx Sec-3000
CVE-2025-13659Shared CWE-913
CVE-2025-68613Shared CWE-913
CVE-2025-66398Shared CWE-913
CVE-2026-25049Shared CWE-913
CVE-2026-33286Shared CWE-913
CVE-2024-8953Shared CWE-913
CVE-2025-31674Shared CWE-913

References