First published: Tue May 06 2025(Updated: )
In Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330, an attacker could connect with the device's ssh server and utilize the system's components to perform OS command executions.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Optigo Networks ONS NC600 | >=4.2.1-084<=4.7.2-330 | |
Optigo Networks ONS NC600 |
Optigo Networks recommends users implement at least one of the following additional mitigations: * Use a dedicated NIC on the BMS computer and exclusively use the computer for connecting to OneView to manage your OT network configuration. * Set up a router firewall with a white list for the devices permitted to access OneView. * Connect to OneView via secure VPN.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4041 has a medium severity rating, indicating potential risk to the device's integrity.
To mitigate CVE-2025-4041, update the Optigo Networks ONS NC600 to the latest version beyond 4.7.2-330.
CVE-2025-4041 allows attackers to exploit SSH access for performing unauthorized OS command executions.
CVE-2025-4041 affects Optigo Networks ONS NC600 versions 4.2.1-084 through 4.7.2-330.
The vendor for CVE-2025-4041 is Optigo Networks.