PT-2025-45604 · Jumo · Jumo Varitron300
Published
2025-11-10
·
Updated
2025-11-14
·
CVE-2025-41731
CVSS v3.1
7.4
High
| AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Jumo variTRON300 (affected versions not specified)
Description
A flaw exists in the password generation algorithm when accessing the debug interface. An unauthenticated local attacker who knows the password generation timeframe may be able to brute force the password and gain root access to the device if the debug interface remains enabled. The issue relates to insufficient entropy in the pseudorandom number generator (PRNG) used for password creation.
Recommendations
Disable the debug interface to prevent exploitation.
Monitor access to the debug interface for any suspicious activity.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Jumo Varitron300