A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.
History

Mon, 10 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.
Title Jumo: Insufficient entropy in PRNG may lead to root access
Weaknesses CWE-338
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-11-10T07:44:40.644Z

Updated: 2025-11-10T15:20:07.843Z

Reserved: 2025-04-16T11:17:48.319Z

Link: CVE-2025-41731

cve-icon Vulnrichment

Updated: 2025-11-10T15:19:02.860Z

cve-icon NVD

Status : Received

Published: 2025-11-10T08:15:33.957

Modified: 2025-11-10T08:15:33.957

Link: CVE-2025-41731

cve-icon Redhat

No data.