Multiple vulnerabilities in Emerson ValveLink Products



Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2025-52579
CVE-2025-50109
CVE-2025-46358
CVE-2025-48496
CVE-2025-53471
CWE-ID CWE-312
CWE-693
CWE-428
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
ValveLink SOLO
Other software / Other software solutions

ValveLink DTM
Other software / Other software solutions

ValveLink PRM
Other software / Other software solutions

ValveLink SNAP-ON
Other software / Other software solutions

Vendor Emerson

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Cleartext storage of sensitive information

EUVDB-ID: #VU112712

Risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-52579

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information. A remote attacker can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ValveLink SOLO: before 14.0

ValveLink DTM: before 14.0

ValveLink PRM: before 14.0

ValveLink SNAP-ON: before 14.0

CPE2.3 External links

https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cleartext storage of sensitive information

EUVDB-ID: #VU112713

Risk: Low

CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-50109

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to cleartext storage of sensitive information. A local attacker can gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ValveLink SOLO: before 14.0

ValveLink DTM: before 14.0

ValveLink PRM: before 14.0

ValveLink SNAP-ON: before 14.0

CPE2.3 External links

https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Protection Mechanism Failure

EUVDB-ID: #VU112714

Risk: High

CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-46358

CWE-ID: CWE-693 - Protection Mechanism Failure

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. A remote attacker can bypass implemented security restrictions and elevate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ValveLink SOLO: before 14.0

ValveLink DTM: before 14.0

ValveLink PRM: before 14.0

ValveLink SNAP-ON: before 14.0

CPE2.3 External links

https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Unquoted Search Path or Element

EUVDB-ID: #VU112715

Risk: Medium

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-48496

CWE-ID: CWE-428 - Unquoted Search Path or Element

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled search path element. A remote attacker can cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ValveLink SOLO: before 14.0

ValveLink DTM: before 14.0

ValveLink PRM: before 14.0

ValveLink SNAP-ON: before 14.0

CPE2.3 External links

https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Input validation error

EUVDB-ID: #VU112716

Risk: High

CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-53471

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and modify data or system behavior.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ValveLink SOLO: before 14.0

ValveLink DTM: before 14.0

ValveLink PRM: before 14.0

ValveLink SNAP-ON: before 14.0

CPE2.3 External links

https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###