Critical Vulnerability Information Vulnerability ID VDE-2025-026 Release Date 2025-05-12 10:00 (CEST) Last Updated 2025-05-12 10:00 (CEST) Vendor AUMA Riester GmbH & Co. KG Affected Products and Versions Vulnerability Description In the control of AUMA actuators, sending excessive data to the service telegram can cause a buffer overflow. Depending on the actuator, the service telegram is transmitted via Bluetooth or RS232 interface. CVE ID CVE-2025-3496 Last Update Time May 9, 2025, 1:31 PM Severity 7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Weakness Type Input size not checked during buffer copy (Classic buffer overflow) (CWE-120) Impact Buffer overflow may lead to unintended behavior, such as rebooting the actuator control. Solution If the Bluetooth interface or optional RS-232 interface is not required for normal operation, it is recommended to activate or use it only when necessary, for example, during actuator configuration or reading diagnostic data. It should be disabled under normal operating conditions. Mitigation For actuators with Bluetooth, it is recommended to update the actuator control firmware to a newer version to prevent buffer overflow. For actuators without Bluetooth, it is recommended to restrict physical access to the actuator and, if possible, update the firmware. Reporter CERT@VDE in coordination with AUMA Riester Reporter: Dennis Schaefer from ONEKEY GmbH