Risk | High |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2025-52579 CVE-2025-50109 CVE-2025-46358 CVE-2025-48496 CVE-2025-53471 |
CWE-ID | CWE-312 CWE-693 CWE-428 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
ValveLink SOLO Other software / Other software solutions ValveLink DTM Other software / Other software solutions ValveLink PRM Other software / Other software solutions ValveLink SNAP-ON Other software / Other software solutions |
Vendor | Emerson |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU112712
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-52579
CWE-ID:
CWE-312 - Cleartext Storage of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to cleartext storage of sensitive information. A remote attacker can gain access to sensitive information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsValveLink SOLO: before 14.0
ValveLink DTM: before 14.0
ValveLink PRM: before 14.0
ValveLink SNAP-ON: before 14.0
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112713
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-50109
CWE-ID:
CWE-312 - Cleartext Storage of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to cleartext storage of sensitive information. A local attacker can gain access to sensitive information.
MitigationInstall updates from vendor's website.
Vulnerable software versionsValveLink SOLO: before 14.0
ValveLink DTM: before 14.0
ValveLink PRM: before 14.0
ValveLink SNAP-ON: before 14.0
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112714
Risk: High
CVSSv4.0: 8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-46358
CWE-ID:
CWE-693 - Protection Mechanism Failure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. A remote attacker can bypass implemented security restrictions and elevate privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsValveLink SOLO: before 14.0
ValveLink DTM: before 14.0
ValveLink PRM: before 14.0
ValveLink SNAP-ON: before 14.0
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112715
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-48496
CWE-ID:
CWE-428 - Unquoted Search Path or Element
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled search path element. A remote attacker can cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsValveLink SOLO: before 14.0
ValveLink DTM: before 14.0
ValveLink PRM: before 14.0
ValveLink SNAP-ON: before 14.0
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU112716
Risk: High
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-53471
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can pass specially crafted input to the application and modify data or system behavior.
MitigationInstall updates from vendor's website.
Vulnerable software versionsValveLink SOLO: before 14.0
ValveLink DTM: before 14.0
ValveLink PRM: before 14.0
ValveLink SNAP-ON: before 14.0
CPE2.3https://www.cisa.gov/news-events/ics-advisories/icsa-25-189-01
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.