CWE
298
EPSS
0.009%
Advisory Published
Updated

CVE-2025-4384: Certificate validity not properly verified

First published: Tue May 06 2025(Updated: )

The MQTT add-on of PcVue fails to verify that a remote device’s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly. The use of a client certificate reduces the risk for random devices to take advantage of this flaw.

Credit: 87c8e6ad-f0f5-4ca8-89e2-89f26d6ed932

Affected SoftwareAffected VersionHow to fix
PcVue MQTT add-on

Remedy

Harden the configuration Who should apply this recommendation: All users The system operators are highly recommended to take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should: * Use client certificate when configuring the MQTT add-on. * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet unless required. * Locate control system networks and remote devices behind firewalls and isolate them from business networks. * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices. Update PcVue Who should apply this recommendation: All users using the affected component Apply the patch by installing a fixed PcVue version. Available patches: Fixed in: * PcVue 16.3.0 Planned in: * PcVue 16.2.5 * PcVue 15.2.12

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2025-4384?

    CVE-2025-4384 is rated as a medium severity vulnerability due to its potential to allow unauthorized access through invalid certificates.

  • How do I fix CVE-2025-4384?

    To mitigate CVE-2025-4384, ensure that the PcVue MQTT add-on is updated to the latest version that includes a fix for improper certificate validation.

  • What are the risks associated with CVE-2025-4384?

    The risks associated with CVE-2025-4384 include exposure to unauthorized devices which can lead to potential data breaches and compromise of the network.

  • Which versions of the PcVue MQTT add-on are affected by CVE-2025-4384?

    CVE-2025-4384 affects all versions of the PcVue MQTT add-on prior to the security patch that addresses this vulnerability.

  • What is the impact of CVE-2025-4384 on IoT security?

    CVE-2025-4384 impacts IoT security by allowing malicious devices to bypass certificate checks, thus increasing the risk of attacks on IoT networks.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203