Browse all 6 CVE security advisories affecting Sprecher Automation. AI-powered Chinese analysis, POCs, and references for each vulnerability.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-41742 | Sprecher Automation: SPRECON-E series has a critical vulnerability due to the use of static cryptographic keys in system components — SPRECON-E-CCWE-1394 | 9.8 | Critical | 2025-12-02 |
| CVE-2025-41743 | Sprecher Automation: SPRECON-E series prone to weak encryption of update files — SPRECON-E-CCWE-326 | 4.0 | Medium | 2025-12-02 |
| CVE-2025-41744 | Sprecher Automation: SPRECON-E series has static default key material for TLS connections — SPRECON-E-CCWE-1394 | 9.1 | Critical | 2025-12-02 |
| CVE-2024-6758 | Improper Privilege Management vulnerability in Sprecher Automation SPRECON-E — SPRECON-ECWE-266 | 6.5 | Medium | 2024-08-12 |
| CVE-2022-4332 | Sprecher: Vulnerable firmware verification — SPRECON-E-C/P/T3 CPU PU244xCWE-20 | 6.8 | Medium | 2023-06-01 |
| CVE-2022-4333 | Sprecher: Sprecon maintenance access with hardcoded credentials — SPRECON-E CPU PU243xCWE-798 | 9.8 | Critical | 2023-06-01 |
This page lists every published CVE security advisory associated with Sprecher Automation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.