CVE Alert: CVE-2025-41703 – Phoenix Contact – QUINT4-UPS/24DC/24DC/5/EIP
CVE-2025-41703
HIGHNo exploitation known
An unauthenticated remote attacker can cause a Denial of Service by turning off the output of the UPS via Modbus command.
CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Phoenix Contact, Phoenix Contact, Phoenix Contact, Phoenix Contact
Product
QUINT4-UPS/24DC/24DC/5/EIP, QUINT4-UPS/24DC/24DC/10/EIP, QUINT4-UPS/24DC/24DC/20/EIP, QUINT4-UPS/24DC/24DC/40/EIP
Versions
VC:00 lte VC:07 | VC:00 lte VC:07 | VC:00 lte VC:07 | VC:00 lte VC:07
CWE
CWE-306, CWE-306 Missing Authentication for Critical Function
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Published
2025-10-14T08:05:23.395Z
Updated
2025-10-14T18:38:47.646Z
AI Summary Analysis
**Risk verdict**: High risk due to unauthenticated Modbus commands enabling remote denial of service on the UPS output; no known exploitation activity observed at present, but rapid threat remediations are warranted.
**Why this matters**: An attacker can disable critical power output without credentials, potentially causing unplanned outages and equipment disruption in industrial or data-centre environments. The goal may be service disruption, safety impact, or loss of availability for critical operations.
**Most likely attack path**: An attacker with network access targets the Modbus/TCP interface exposed to the network. With no privileges required, they issue a write command to turn off the UPS output, triggering a high-availability DoS without user interaction. The preconditions are a reachable Modbus service and a lack of authentication, with no lateral movement required beyond this device.
**Who is most exposed**: Organisations deploying UPS units in industrial/OT environments or tightly coupled data/operations networks where Modbus interfaces are accessible from IT or remote networks are at greatest risk.
**Detection ideas**:
- Unauthorised Modbus write commands to UPS control registers.
- Sudden output-off/shutdown events reported by the UPS.
- Anomalous Modbus/TCP traffic to the device, especially unusual function codes.
- Logs showing Modbus commands without preceding authentication.
- Power disruption alerts correlated with remote management activity.
**Mitigation and prioritisation**:
- Patch to fixed software/release when vendor updates are available.
- Disable or tightly restrict Modbus/TCP access to trusted networks and devices; implement ACLs and network segmentation.
- Enforce strong access controls on management networks; remove or lock down exposed interfaces.
- Monitor Modbus activity and correlate with UPS state changes; alert on outbound control commands.
- If KEV is present or EPSS ≥ 0.5 (data currently missing), treat as priority 1; otherwise escalate promptly but within an active-change window. If data is missing, confirm EPSS and KEV status to refine urgency.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.