PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-50109 Emerson CVE debrief

CVE-2025-50109 is a high-severity information exposure issue in Emerson ValveLink products. According to CISA’s advisory, affected versions of ValveLink SOLO, DTM, PRM, and SNAP-ON before 14.0 may store sensitive information in cleartext in a resource that could be accessible across a control sphere boundary. Emerson recommends upgrading to ValveLink 14.0 or later.

Vendor
Emerson
Product
ValveLink SOLO
CVSS
HIGH 7.7
CISA KEV
Not listed in stored evidence
Original CVE published
2025-07-08
Original CVE updated
2025-07-08
Advisory published
2025-07-08
Advisory updated
2025-07-08

Who should care

OT/ICS operators using Emerson ValveLink SOLO, DTM, PRM, or SNAP-ON versions earlier than 14.0; plant engineers; system administrators; and asset owners responsible for Windows-based engineering or maintenance workstations that interact with control systems.

Technical summary

CISA’s CSAF advisory for ICSA-25-189-01 describes a cleartext storage weakness: sensitive information may be written to a resource that another control sphere can access. The affected products are Emerson ValveLink SOLO, DTM, PRM, and SNAP-ON with versions earlier than ValveLink 14.0. The published CVSS 3.1 vector is AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, reflecting a local-access exposure with high confidentiality and integrity impact and no availability impact.

Defensive priority

High. This is a published high-severity exposure in OT-related software, and the vendor-provided mitigation is straightforward: upgrade to a fixed release.

Recommended defensive actions

  • Upgrade Emerson ValveLink SOLO, DTM, PRM, and SNAP-ON to ValveLink 14.0 or later using Emerson’s software download portal.
  • Identify any systems running ValveLink versions earlier than 14.0 and prioritize them for patching or removal from service until updated.
  • Review workstation and file-access controls so sensitive configuration or credential material is not left in cleartext on shared or reachable resources.
  • Limit access to engineering and maintenance workstations to authorized users only and apply least-privilege controls where feasible.
  • Monitor Emerson security notifications and validate the updated software package before deployment in production environments.

Evidence notes

This debrief is based on the CISA CSAF advisory for ICSA-25-189-01 and the CVE record metadata provided in the source corpus. The advisory states the issue, the affected product list, the fixed version threshold, and the vendor remediation. No exploit details are included.

Official resources

CISA published the advisory and CVE record on 2025-07-08. The source corpus shows a single initial publication on that date with no later modification.