Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E...
Critical severity
Unreviewed
Published
Dec 2, 2025
to the GitHub Advisory Database
•
Updated Dec 2, 2025
Description
Published by the National Vulnerability Database
Dec 2, 2025
Published to the GitHub Advisory Database
Dec 2, 2025
Last updated
Dec 2, 2025
Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3 is vulnerable to attack by an unauthorized remote attacker via default cryptographic keys. The use of these keys allows the attacker to read, modify, and write projects and data, or to access any device via remote maintenance.
References