{"vulnerability": "CVE-2025-3495", "sightings": [{"uuid": "4495470d-c19f-48e8-9223-c5c721d77ebf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-07", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "2e8dc8ef-cb37-4d76-b236-c464d7719776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmvqmosne32j", "content": "", "creation_timestamp": "2025-04-16T04:23:23.507962Z"}, {"uuid": "3c4f164f-c121-470f-9f5b-7e244cd5ea0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114345831076636189", "content": "", "creation_timestamp": "2025-04-16T04:48:37.544888Z"}, {"uuid": "622df671-93d5-41c2-a896-03c054bbfcce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11985", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3495\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Delta Electronics COMMGR v1 and v2\u00a0uses insufficiently randomized values to generate session IDs (CWE-338). An attacker could easily brute force a session ID and load and execute arbitrary code.\n\ud83d\udccf Published: 2025-04-16T03:10:05.952Z\n\ud83d\udccf Modified: 2025-04-16T03:10:05.952Z\n\ud83d\udd17 References:\n1. https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00005_COMMGR%20-%20Insufficient%20Randomization%20Authentication%20Bypass_v1.pdf\n2. https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-07", "creation_timestamp": "2025-04-16T03:55:19.000000Z"}, {"uuid": "f17a1dad-b410-44d1-8a9d-a044b9fa49cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-397/", "content": "", "creation_timestamp": "2025-06-17T03:00:00.000000Z"}, {"uuid": "6ac06b8b-9e08-4517-93c8-9406cd6a6843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114347793805744941", "content": "", "creation_timestamp": "2025-04-16T13:07:46.013011Z"}, {"uuid": "114089bc-dbe1-40d1-8025-ec409bdf6ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114347806657414208", "content": "", "creation_timestamp": "2025-04-16T13:11:02.071339Z"}, {"uuid": "37c7d695-4d70-4960-a362-62252c2da556", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "https://t.me/cvedetector/23048", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3495 - Delta Electronics COMMGR Session ID Brute Force Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3495 \nPublished : April 16, 2025, 3:15 a.m. | 2\u00a0hours, 9\u00a0minutes ago \nDescription : Delta Electronics COMMGR v1 and v2\u00a0uses insufficiently randomized values to generate session IDs (CWE-338). An attacker could easily brute force a session ID and load and execute arbitrary code. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-16T07:40:06.000000Z"}, {"uuid": "00d04ab9-5262-41df-b0ca-ca63e12aac88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3495", "type": "seen", "source": "Telegram/F_0VcnCOpYsbEYi_YiY5LCDslwXaWqovpn_5N-rpqyqsX-A", "content": "", "creation_timestamp": "2025-04-16T06:30:18.000000Z"}]}