CVE-2025-7390

9.1 CRITICAL

📋 TL;DR

CVE-2025-7390 allows a malicious client to bypass client certificate authentication in Softing OPC HTTPS servers configured for secure communication only. This authentication bypass enables unauthorized access to industrial control systems. Affected systems include Softing's OPC products used in industrial automation environments.

💻 Affected Systems

Products:
  • Softing OPC products with HTTPS server functionality
Versions: Specific versions not detailed in references; consult vendor advisory for exact affected versions
Operating Systems: Windows, Linux (where applicable)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations where client certificate authentication is required for secure communication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems allowing unauthorized access to critical infrastructure, potential manipulation of industrial processes, and data exfiltration.

🟠

Likely Case

Unauthorized access to OPC servers enabling data theft, monitoring of industrial processes, and potential manipulation of non-critical systems.

🟢

If Mitigated

Limited impact due to network segmentation, additional authentication layers, and monitoring detecting anomalous access patterns.

🌐 Internet-Facing: HIGH - Internet-facing OPC servers could be directly exploited by remote attackers without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to bypass authentication controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the OPC HTTPS server endpoint but no authentication credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult vendor advisory for specific patched versions

Vendor Advisory: https://industrial.softing.com/fileadmin/psirt/downloads/2025/CVE-2025-7390.html

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected versions. 2. Download and apply the security patch from Softing. 3. Restart the OPC server service. 4. Verify certificate authentication is functioning correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate OPC servers in protected network segments with strict firewall rules

Additional Authentication Layer

all

Implement VPN or additional authentication mechanism before OPC server access

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to trusted IP addresses only
  • Monitor for unauthorized connection attempts and failed authentication events

🔍 How to Verify

Check if Vulnerable:

Check if using affected Softing OPC products with HTTPS server requiring client certificates

Check Version:

Consult product documentation for version check command specific to your Softing OPC product

Verify Fix Applied:

Test client certificate authentication after patch application; unauthorized clients should be rejected

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation events
  • Unexpected successful connections without valid certificates
  • Authentication bypass attempts

Network Indicators:

  • Unauthorized HTTPS connections to OPC server ports
  • Traffic patterns inconsistent with normal certificate authentication

SIEM Query:

source="opc_server" AND (event_type="authentication" AND result="success" AND certificate_validation="bypassed")

🔗 References

📤 Share & Export