CISA Warns ValveLink Products May Expose Sensitive System Information

CISA Warns ValveLink Products May Expose Sensitive System Information

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security advisory warning that multiple vulnerabilities in Emerson ValveLink Products could allow attackers to access sensitive system information and execute unauthorized code.

The alert, designated ICSA-25-189-01 and released on July 8, 2025, carries a maximum CVSS v4 score of 9.3, indicating the severity of these security flaws.

Critical Vulnerabilities Identified

The security advisory identifies five distinct vulnerabilities affecting ValveLink products, with successful exploitation potentially allowing attackers with system access to read sensitive information stored in cleartext, tamper with critical parameters, and run unauthorized code.

The vulnerabilities span across multiple product lines including ValveLink SOLO, ValveLink DTM, ValveLink PRM, and ValveLink SNAP-ON, with all versions prior to ValveLink 14.0 being affected.

CVE ID Vulnerability Type CVSS v3 Score CVSS v4 Score
CVE-2025-52579 Cleartext Storage of Sensitive Information in Memory 9.4 9.3
CVE-2025-50109 Cleartext Storage of Sensitive Information in Memory 7.7 8.5
CVE-2025-46358 Protection Mechanism Failure 7.7 8.5
CVE-2025-48496 Uncontrolled Search Path Element 5.1 5.9
CVE-2025-53471 Improper Input Validation 5.1 5.9

The most severe vulnerability, CVE-2025-52579, involves cleartext storage of sensitive information in memory and has been assigned a CVSS v3 base score of 9.4.

This vulnerability allows sensitive memory to potentially be saved to disk, stored in core dumps, or remain uncleared following system crashes or improper memory management.

The flaw poses significant risks as it can be exploited remotely with low attack complexity.

Additional vulnerabilities compound the security risks. CVE-2025-50109, another cleartext storage issue, carries a CVSS v3 score of 7.7 and enables access to sensitive information stored within resources accessible to other control spheres.

The protection mechanism failure vulnerability (CVE-2025-46358) also scores 7.7 on the CVSS v3 scale, indicating that the product fails to implement adequate defenses against directed attacks.

Two additional vulnerabilities, though scoring lower on severity scales, still present significant risks.

CVE-2025-48496 addresses uncontrolled search path elements with a CVSS v3 score of 5.1, while CVE-2025-53471 covers improper input validation with the same score.

Affected Systems and Global Impact

The vulnerabilities affect critical manufacturing infrastructure deployed worldwide. Emerson, headquartered in the United States, reported these security flaws to CISA, demonstrating responsible disclosure practices.

The widespread deployment of these systems across global critical infrastructure sectors amplifies the potential impact of these vulnerabilities.

Organizations utilizing affected ValveLink products should prioritize immediate upgrades to version 14.0 or later to mitigate these security risks.

The combination of high severity scores and remote exploitation capabilities makes these vulnerabilities particularly concerning for industrial control systems operators.

Stay Updated on Daily Cybersecurity News . Follow us on Google News, LinkedIn, and X.


Source link