CVE-2025-7390
📋 TL;DR
CVE-2025-7390 allows a malicious client to bypass client certificate authentication in Softing OPC HTTPS servers configured for secure communication only. This authentication bypass enables unauthorized access to industrial control systems. Affected systems include Softing's OPC products used in industrial automation environments.
💻 Affected Systems
- Softing OPC products with HTTPS server functionality
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial control systems allowing unauthorized access to critical infrastructure, potential manipulation of industrial processes, and data exfiltration.
Likely Case
Unauthorized access to OPC servers enabling data theft, monitoring of industrial processes, and potential manipulation of non-critical systems.
If Mitigated
Limited impact due to network segmentation, additional authentication layers, and monitoring detecting anomalous access patterns.
🎯 Exploit Status
Exploitation requires network access to the OPC HTTPS server endpoint but no authentication credentials.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Consult vendor advisory for specific patched versions
Vendor Advisory: https://industrial.softing.com/fileadmin/psirt/downloads/2025/CVE-2025-7390.html
Restart Required: Yes
Instructions:
1. Review vendor advisory for affected versions. 2. Download and apply the security patch from Softing. 3. Restart the OPC server service. 4. Verify certificate authentication is functioning correctly.
🔧 Temporary Workarounds
Network Segmentation
allIsolate OPC servers in protected network segments with strict firewall rules
Additional Authentication Layer
allImplement VPN or additional authentication mechanism before OPC server access
🧯 If You Can't Patch
- Implement strict network access controls to limit connections to trusted IP addresses only
- Monitor for unauthorized connection attempts and failed authentication events
🔍 How to Verify
Check if Vulnerable:
Check if using affected Softing OPC products with HTTPS server requiring client certificates
Check Version:
Consult product documentation for version check command specific to your Softing OPC product
Verify Fix Applied:
Test client certificate authentication after patch application; unauthorized clients should be rejected
📡 Detection & Monitoring
Log Indicators:
- Failed certificate validation events
- Unexpected successful connections without valid certificates
- Authentication bypass attempts
Network Indicators:
- Unauthorized HTTPS connections to OPC server ports
- Traffic patterns inconsistent with normal certificate authentication
SIEM Query:
source="opc_server" AND (event_type="authentication" AND result="success" AND certificate_validation="bypassed")