CVE-2025-47904 (GCVE-0-2025-47904)

Vulnerability from cvelistv5 – Published: 2026-02-24 15:34 – Updated: 2026-02-24 15:34
VLAI?
Title
Unsigned upgrade package
Summary
Download of Code Without Integrity Check vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This issue affects Time Provider 4100: before 2.5.
CWE
  • CWE-494 - Download of Code Without Integrity Check
Assigner
References
Impacted products
Vendor Product Version
Microchip Time Provider 4100 Affected: 0 , < 2.5 (semver)
Create a notification for this product.
Credits
Dario Emilio Bertani Raffaele Bova Andrea Sindoni Simone Bossi Antonio Carriero Marco Manieri Vito Pistillo Davide Renna Manuel Leone Massimiliano Brolli TIM Security Red Team Research (TIM S.p.A)
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Time Provider 4100",
          "vendor": "Microchip",
          "versions": [
            {
              "lessThan": "2.5",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "User knowledge of the decryption passwords and upgrade package structure.\u003cbr\u003e"
            }
          ],
          "value": "User knowledge of the decryption passwords and upgrade package structure."
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Dario Emilio Bertani"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Raffaele Bova"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Andrea Sindoni"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Simone Bossi"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Antonio Carriero"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Marco Manieri"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Vito Pistillo"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Davide Renna"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Manuel Leone"
        },
        {
          "lang": "en",
          "type": "finder",
          "value": "Massimiliano Brolli"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "TIM Security Red Team Research (TIM S.p.A)"
        }
      ],
      "datePublic": "2026-02-18T23:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Download of Code Without Integrity Check vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.\u003cp\u003eThis issue affects Time Provider 4100: before 2.5.\u003c/p\u003e"
            }
          ],
          "value": "Download of Code Without Integrity Check vulnerability in Microchip Time Provider 4100 allows Malicious Manual Software Update.This issue affects Time Provider 4100: before 2.5."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-533",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-533 Malicious Manual Software Update"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "LOCAL",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "LOW",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-494",
              "description": "CWE-494 Download of Code Without Integrity Check",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-24T15:34:20.905Z",
        "orgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
        "shortName": "Microchip"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.microchip.com/en-us/solutions/technologies/embedded-security/how-to-report-potential-product-security-vulnerabilities/timeprovider-4100-unsigned-upgrade-vulnerability"
        }
      ],
      "source": {
        "advisory": "PSIRT-105",
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2025-04-14T22:00:00.000Z",
          "value": "Reported"
        }
      ],
      "title": "Unsigned upgrade package",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Upgrades are only available on a separate management port which should \nnot be connected to an untrusted network.  ACLs are available to further\n restrict access to only trusted addresses.\n\n\u003cbr\u003e"
            }
          ],
          "value": "Upgrades are only available on a separate management port which should \nnot be connected to an untrusted network.  ACLs are available to further\n restrict access to only trusted addresses."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dc3f6da9-85b5-4a73-84a2-2ec90b40fca5",
    "assignerShortName": "Microchip",
    "cveId": "CVE-2025-47904",
    "datePublished": "2026-02-24T15:34:20.905Z",
    "dateReserved": "2025-05-13T19:24:53.452Z",
    "dateUpdated": "2026-02-24T15:34:20.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…