PatchSiren cyber security CVE debrief
CVE-2025-15577 Valmet CVE debrief
CVE-2025-15577 is a high-severity file-read vulnerability in Valmet DNA Engineering Web Tools. CISA’s advisory says an unauthenticated attacker can manipulate a URL to read arbitrary files, creating a material confidentiality risk for affected deployments. Valmet states a fix is available, so organizations should treat this as a prompt remediation item for any exposed or in-use installations.
- Vendor
- Valmet
- Product
- <=C2022
- CVSS
- HIGH 8.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-19
- Original CVE updated
- 2026-02-19
- Advisory published
- 2026-02-19
- Advisory updated
- 2026-02-19
Who should care
OT/ICS operators, plant automation teams, and administrators responsible for Valmet DNA Engineering Web Tools deployments, especially older <=C2022 installations identified in the advisory corpus.
Technical summary
The supplied advisory text describes an unauthenticated attack path where URL manipulation leads to arbitrary file read access. The provided CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (8.6), which indicates network reachability, no privileges, no user interaction, and a confidentiality impact. No integrity or availability impact is indicated in the supplied vector.
Defensive priority
High. Because the issue is unauthenticated, network-reachable, and capable of exposing files, it should be remediated quickly—especially where the web tools are reachable from broader enterprise or external networks.
Recommended defensive actions
- Apply the Valmet fix referenced in the advisory and contact Valmet automation customer service for assistance if needed.
- Restrict network access to Valmet DNA Engineering Web Tools to trusted management segments and avoid unnecessary exposure.
- Review access logs and file-access related telemetry for unusual requests against the engineering web tools.
- Validate whether any sensitive configuration, credential, or project files could have been exposed and rotate secrets if exposure is suspected.
- Track the issue against the official CISA advisory and the vendor advisory for any follow-on guidance or additional affected versions.
Evidence notes
This debrief is based on the supplied CISA CSAF advisory ICSA-26-050-02 and its linked official references. The corpus states: an unauthenticated attacker can manipulate the URL to achieve arbitrary file read access, and Valmet has issued a fix. The supplied vendor metadata is low-confidence and marked for review, so product naming should be verified against the official Valmet advisory before downstream use.
Official resources
-
CVE-2025-15577 CVE record
CVE.org
-
CVE-2025-15577 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in ICSA-26-050-02 on 2026-02-19, with the advisory corpus indicating that Valmet has issued a fix.