First published: Tue Feb 11 2025(Updated: )
The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected.
Credit: 551230f0-3615-47bd-b7cc-93e92e730bbf
Affected Software | Affected Version | How to fix |
---|---|---|
Wattsense Bridge | <= |
The device is meant to be installed at a restricted access physical location according to the vendor and exploitation requires more attacker knowledge and higher physical access. The issue will be put in the backlog of the Wattsense team.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26408 is considered a high severity vulnerability due to the potential for unauthorized access and manipulation of firmware.
To fix CVE-2025-26408, ensure physical security of the Wattsense Bridge devices to prevent unauthorized JTAG access.
CVE-2025-26408 affects all known versions of the Wattsense Bridge devices.
The risks of CVE-2025-26408 include unauthorized access to sensitive information and the capability to modify device firmware.
CVE-2025-26408 cannot be exploited remotely, as it requires physical access to the device's PCB.