Insufficient encryption strength in Sprecher Automation SPRECON-E-C, SPRECON-E-P, and SPRECON-E-T3 allows a local unprivileged attacker to extract data from update images and thus obtain limited information about the architecture and internal processes.
References
| Link | Resource |
|---|---|
| https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2511043_de.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
23 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:sprecher-automation:sprecon-e-c:*:*:*:*:*:*:*:* cpe:2.3:h:sprecher-automation:sprecon-e-t3:*:*:*:*:*:*:*:* cpe:2.3:h:sprecher-automation:sprecon-e-p:*:*:*:*:*:*:*:* cpe:2.3:o:sprecher-automation:sprecon-e-p_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Sprecher-automation
Sprecher-automation sprecon-e-c Sprecher-automation sprecon-e-p Firmware Sprecher-automation sprecon-e-p Sprecher-automation sprecon-e-t3 Sprecher-automation sprecon-e-c Firmware Sprecher-automation sprecon-e-t3 Firmware |
|
| References | () https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/SPR-2511043_de.pdf - Vendor Advisory |
02 Dec 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-02 11:15
Updated : 2026-02-23 17:16
NVD link : CVE-2025-41743
Mitre link : CVE-2025-41743
CVE.ORG link : CVE-2025-41743
JSON object : View
Products Affected
sprecher-automation
- sprecon-e-t3
- sprecon-e-c_firmware
- sprecon-e-p_firmware
- sprecon-e-c
- sprecon-e-t3_firmware
- sprecon-e-p
CWE
CWE-326
Inadequate Encryption Strength
