Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Endress+Hauser — Vulnerabilities & Security Advisories 23

Browse all 23 CVE security advisories affecting Endress+Hauser. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Endress+Hauser operates as a global provider of industrial process automation solutions, specializing in measurement technologies for flow, pressure, level, temperature, and pH. The company’s product portfolio includes smart sensors and controllers widely deployed in critical infrastructure sectors such as water treatment, oil and gas, and pharmaceuticals. Security audits have identified twenty-three Common Vulnerabilities and Exposures (CVEs) associated with its devices, predominantly involving remote code execution, cross-site scripting, and privilege escalation flaws. These vulnerabilities often stem from insufficient input validation and weak authentication mechanisms within the web interfaces and communication protocols of their industrial instruments. While no massive public data breaches have been widely reported, the presence of these flaws poses significant risks to operational technology environments. The company has issued firmware updates to mitigate identified issues, yet the persistent nature of these CVEs highlights ongoing challenges in securing legacy industrial control systems against sophisticated cyber threats.

CVE IDTitleCVSSSeverityPublished
CVE-2025-41690 Endress+Hauser: Proline 10 Maintenance credentials may be exposed under certain conditions — Promag 10 with HARTCWE-532 7.4 High2025-09-02
CVE-2025-27461 CVE-2025-27461 — Endress+Hauser MEAC300-FNADE4CWE-862 7.6 High2025-07-03
CVE-2025-27460 CVE-2025-27460 — Endress+Hauser MEAC300-FNADE4CWE-312 7.6 High2025-07-03
CVE-2025-27459 CVE-2025-27459 — Endress+Hauser MEAC300-FNADE4CWE-257 4.4 Medium2025-07-03
CVE-2025-27458 CVE-2025-27458 — Endress+Hauser MEAC300-FNADE4CWE-327 6.5 Medium2025-07-03
CVE-2025-27457 CVE-2025-27457 — Endress+Hauser MEAC300-FNADE4CWE-319 6.5 Medium2025-07-03
CVE-2025-27456 CVE-2025-27456 — Endress+Hauser MEAC300-FNADE4CWE-307 7.5 High2025-07-03
CVE-2025-27455 CVE-2025-27455 — Endress+Hauser MEAC300-FNADE4CWE-1021 4.3 Medium2025-07-03
CVE-2025-27454 CVE-2025-27454 — Endress+Hauser MEAC300-FNADE4CWE-352 4.3 Medium2025-07-03
CVE-2025-27453 CVE-2025-27453 — Endress+Hauser MEAC300-FNADE4CWE-1004 5.3 Medium2025-07-03
CVE-2025-27452 CVE-2025-27452 — Endress+Hauser MEAC300-FNADE4CWE-548 5.3 Medium2025-07-03
CVE-2025-27451 CVE-2025-27451 — Endress+Hauser MEAC300-FNADE4CWE-204 5.3 Medium2025-07-03
CVE-2025-27450 CVE-2025-27450 — Endress+Hauser MEAC300-FNADE4CWE-614 6.5 Medium2025-07-03
CVE-2025-27449 CVE-2025-27449 — Endress+Hauser MEAC300-FNADE4CWE-307 7.5 High2025-07-03
CVE-2025-27448 CVE-2025-27448 — Endress+Hauser MEAC300-FNADE4CWE-79 6.8 Medium2025-07-03
CVE-2025-27447 CVE-2025-27447 — Endress+Hauser MEAC300-FNADE4CWE-79 7.4 High2025-07-03
CVE-2025-1711 CVE-2025-1711 — Endress+Hauser MEAC300-FNADE4CWE-1392 4.3 Medium2025-07-03
CVE-2025-1710 CVE-2025-1710 — Endress+Hauser MEAC300-FNADE4CWE-307 7.5 High2025-07-03
CVE-2025-1709 CVE-2025-1709 — Endress+Hauser MEAC300-FNADE4CWE-256 6.5 Medium2025-07-03
CVE-2025-1708 CVE-2025-1708 — Endress+Hauser MEAC300-FNADE4CWE-89 8.6 High2025-07-03
CVE-2024-6596 Endress+Hauser: Multiple products are vulnerable to code injection — Echo Curve ViewerCWE-94 9.8 Critical2024-09-10
CVE-2020-12496 ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 2.x exposures sensitive information to an unauthorized actor — RSG35 - Ecograph TCWE-200 6.5 Medium2020-11-19
CVE-2020-12495 ENDRESS+HAUSER: Ecograph T utilizing Webserver firmware version 1.x has improper privilege management — RSG35 - Ecograph TCWE-269 9.1 Critical2020-11-19

This page lists every published CVE security advisory associated with Endress+Hauser. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.