Phoenix Contact’s Shocking Vulnerability Fix: QUINT4 UPS Gets a Power-Up!

Phoenix Contact patches five vulnerabilities in its QUINT4 UPS products, thwarting potential denial-of-service attacks and login credential thefts. While four flaws were patched, CVE-2025-41703 remains unaddressed for compatibility reasons. Isolated networks and firewalls are recommended to keep hackers from turning your uninterruptible power into a very interruptible power nap.

Pro Dashboard

Hot Take:

Well, it looks like Phoenix Contact’s QUINT4 UPS had more open doors than a Black Friday sale! While the good folks at Phoenix have patched up these security potholes, it seems like one of the doors (CVE-2025-41703) is staying ajar because closing it would apparently disrupt legitimate UPS business. This is like having a guard dog that barks at intruders but also at the mailman. I guess for some vulnerabilities, it’s not just “close the gate” but more of a “keep calm and firewall on” situation.

Key Points:

  • Phoenix Contact patched five vulnerabilities in QUINT4 UPS products.
  • Four vulnerabilities can be exploited for DoS attacks.
  • CVE-2025-41703 is a ‘denial of power service’ flaw that won’t be patched.
  • CVE-2025-41705 can lead to password leakage in a MitM attack.
  • Patches available in firmware version VC:07, except for CVE-2025-41703.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?