CVE-2025-25270
Published: 08 July 2025
Summary
CVE-2025-25270 is a critical-severity Improper Control of Dynamically-Managed Code Resources (CWE-913) vulnerability in Phoenixcontact Charx Sec-3000 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-3 (Configuration Change Control) and SC-7 (Boundary Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the critical flaw allowing unauthenticated remote attackers to alter device configurations for root RCE.
Monitors and controls network communications at boundaries to block unauthenticated remote access to the vulnerable configuration interface.
Requires authorization, documentation, testing, and verification of configuration changes to prevent unauthorized alterations leading to RCE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated network RCE on a public-facing device maps cleanly to initial access via public application exploitation.
NVD Description
An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.
Deeper analysisAI
CVE-2025-25270, published on 2025-07-08, is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) associated with CWE-913. It enables an unauthenticated remote attacker to alter the device configuration in a manner that leads to remote code execution as root, but only under specific configurations.
The vulnerability can be exploited by any unauthenticated attacker with network access to the affected device. Exploitation requires low complexity, no privileges, and no user interaction. Successful attacks grant remote code execution privileges as root, resulting in high impacts to confidentiality, integrity, and availability.
For mitigation details, refer to the advisory at https://certvde.com/de/advisories/VDE-2025-019.
Details
- CWE(s)