Password Generation Algorithm Flaw in Jumo Devices
CVE-2025-41731

7.4HIGH

Key Information:

Vendor

Jumo

Vendor
CVE Published:
10 November 2025

What is CVE-2025-41731?

A flaw has been discovered in the password generation algorithm utilized in Jumo devices when accessing the debug interface. This vulnerability allows an unauthenticated local attacker, who is aware of the timeframe for password generation, to successfully brute force the password. If the debug interface remains enabled, this could potentially grant the attacker root access to the device, posing significant security risks.

Affected Version(s)

variTRON300 0.0.0.0 < 9.0.2.5

variTRON500 0.0.0.0 < 9.0.2.5

variTRON500 touch 0.0.0.0 < 9.0.2.5

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-41731 : Password Generation Algorithm Flaw in Jumo Devices