PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-48496 Emerson CVE debrief

CVE-2025-48496 is a search path vulnerability in Emerson ValveLink products. CISA’s advisory says the issue affects ValveLink SOLO, DTM, PRM, and SNAP-ON versions earlier than 14.0. The published CVSS 3.1 score is 5.1 (Medium), with local attack vector, high attack complexity, no privileges required, no user interaction, and high availability impact. Emerson’s recommended remediation is to update to ValveLink 14.0 or later.

Vendor
Emerson
Product
ValveLink SOLO
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2025-07-08
Original CVE updated
2025-07-08
Advisory published
2025-07-08
Advisory updated
2025-07-08

Who should care

Organizations running Emerson ValveLink SOLO, DTM, PRM, or SNAP-ON prior to 14.0 should care, especially industrial control system teams responsible for workstation or engineering environments where ValveLink is installed.

Technical summary

The advisory describes a fixed or controlled search path weakness in which one or more locations in the path can be influenced by unintended actors. CISA lists affected Emerson ValveLink products as versions earlier than 14.0 for SOLO, DTM, PRM, and SNAP-ON. The public source does not include exploit details or evidence of active exploitation, and it does not place the issue in CISA’s Known Exploited Vulnerabilities catalog in the supplied data.

Defensive priority

Medium. The flaw is publicly disclosed and affects multiple ValveLink product lines, but the supplied advisory rates it as local, high-complexity, and not known to be exploited. Upgrade planning should still be prompt because the vendor provides a clear fixed version.

Recommended defensive actions

  • Upgrade Emerson ValveLink to version 14.0 or later using Emerson’s official software download channel.
  • Inventory deployments of ValveLink SOLO, DTM, PRM, and SNAP-ON and confirm whether any instance is running a version earlier than 14.0.
  • Validate the installation source and update process through Emerson’s security notifications and official support pages.
  • Treat any unpatched affected system as a maintenance priority in engineering and ICS environments, even if it is not internet-facing.
  • Monitor vendor and CISA advisories for any later changes to impact, scope, or mitigation guidance.

Evidence notes

All statements are based on the supplied CISA CSAF advisory record for ICSA-25-189-01 and the linked Emerson remediation references. The advisory lists Emerson as the vendor, ValveLink SOLO/DTM/PRM/SNAP-ON as affected products, and version thresholds of less than 14.0. The source date is 2025-07-08, which is used as the disclosure date here.

Official resources

Publicly disclosed on 2025-07-08 in CISA advisory ICSA-25-189-01. The supplied source data shows no KEV listing and no known ransomware campaign use.