CVE-2025-46358

| EUVD-2025-21094 HIGH
Protection Mechanism Failure (CWE-693)
2025-07-11 [email protected]
7.7
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 16, 2026 - 08:17 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:17 euvd
EUVD-2025-21094
CVE Published
Jul 11, 2025 - 00:15 nvd
HIGH 7.7

DescriptionNVD

Emerson ValveLink products do not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

AnalysisAI

CVE-2025-46358 is a local privilege escalation vulnerability in Emerson ValveLink products stemming from insufficient or missing cryptographic protection mechanisms (CWE-693). An unauthenticated local attacker can exploit this to achieve high-impact confidentiality and integrity violations without requiring user interaction. The vulnerability affects multiple ValveLink product versions and has a CVSS score of 7.7 (high severity) with local attack vector and low complexity.

Technical ContextAI

This vulnerability exists in Emerson ValveLink products, which are Industrial Control System (ICS) software platforms used for valve management and control in critical infrastructure environments. The root cause is classified under CWE-693 (Protection Mechanism Failure), indicating that the product either fails to implement cryptographic protections or implements them incorrectly—potentially affecting authentication, authorization, or data confidentiality mechanisms. Emerson ValveLink is a communication and diagnostic tool designed for valve configuration and monitoring in industrial settings. The improper protection mechanism suggests weaknesses in access controls, encryption implementation, or integrity verification of critical operations or data stores at the local file system or process level.

RemediationAI

  1. Obtain and deploy the official Emerson security patch for CVE-2025-46358 from Emerson's Product Security Advisories page (https://www.emerson.com/en-us/news/press-release). 2. Restrict local system access to ValveLink installations via OS-level access controls (file permissions, user privilege separation). 3. Isolate ValveLink systems on dedicated engineering networks with segmentation from general IT networks. 4. Implement endpoint detection and response (EDR) to monitor for unauthorized local file access or privilege escalation attempts targeting ValveLink processes or data stores. 5. Audit and update authentication/authorization configurations within ValveLink if available. 6. Interim monitoring: log all local process and file system access to ValveLink directories until patched.

Share

CVE-2025-46358 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy