Password Generation Algorithm Flaw in Jumo Devices
CVE-2025-41731

7.4HIGH

Key Information:

Vendor

Jumo

Vendor
CVE Published:
10 November 2025

What is CVE-2025-41731?

A flaw has been discovered in the password generation algorithm utilized in Jumo devices when accessing the debug interface. This vulnerability allows an unauthenticated local attacker, who is aware of the timeframe for password generation, to successfully brute force the password. If the debug interface remains enabled, this could potentially grant the attacker root access to the device, posing significant security risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

variTRON300 0.0.0.0 < 9.0.2.5

variTRON500 0.0.0.0 < 9.0.2.5

variTRON500 touch 0.0.0.0 < 9.0.2.5

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.