Metrics
Affected Vendors & Products
No advisories yet.
Solution
The provider has implement the new versionĀ 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31. | |
| Title | LEAK OF SENSITIVE INFORMATION ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-497 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T09:06:09.297Z
Reserved: 2025-11-25T09:45:49.686Z
Link: CVE-2025-13651
No data.
Status : Received
Published: 2026-02-11T09:15:50.303
Modified: 2026-02-11T09:15:50.303
Link: CVE-2025-13651
No data.
OpenCVE Enrichment
No data.