BluePlanet CRC16 Credentials Derivation Vulnerability (v6.1.4.9)
CVE-2025-40946 Published on May 12, 2026
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 137 TL3 (All versions), blueplanet 150 TL3 (All versions), blueplanet 150 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 155 TL3 (All versions), blueplanet 155 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 165 TL3 (All versions), blueplanet 165 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 25.0 NX3-33.0 NX3 (All versions), blueplanet 3.0 NX3-20.0 NX3 (All versions), blueplanet 3.0 TL3-60.0 TL3 (All versions), blueplanet 3.0-5.0 NX1 (All versions), blueplanet 360 NX3 M6 (All versions), blueplanet 50.0 NX3-60.0 NX3 (All versions), blueplanet 87.0 TL3 (All versions), blueplanet 87.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 92.0 TL3 (All versions), blueplanet 92.0 TL3 GEN2 (All versions < V6.1.4.9), blueplanet gridsafe 110 TL3-S (All versions < V3.91), blueplanet gridsafe 137 TL3-S (All versions < V3.91), blueplanet gridsafe 92.0 TL3-S (All versions < V3.91), blueplanet hybrid 10.0 TL3 (All versions), blueplanet hybrid 6.0 NH3-12.0 NH3 (All versions). A CRC16-based algorithm for generating Technical Service credentials could allow an attacker to derive the credentials from the devices serial number and misuse them to gain unauthorized access.
Weakness Type
Use of Hard-coded Cryptographic Key
The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
Affected Versions
Siemens blueplanet 100 NX3 M8:- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before * is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is unaffected.
- Before * is unaffected.
- Before * is affected.
- Before * is unaffected.
- Before * is unaffected.
- Before * is unaffected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before * is affected.
- Before V6.1.4.9 is affected.
- Before V3.91 is affected.
- Before V3.91 is affected.
- Before V3.91 is affected.
- Before * is unaffected.
- Before * is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.