PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-15577 Valmet CVE debrief

CVE-2025-15577 is a high-severity file-read vulnerability in Valmet DNA Engineering Web Tools. CISA’s advisory says an unauthenticated attacker can manipulate a URL to read arbitrary files, creating a material confidentiality risk for affected deployments. Valmet states a fix is available, so organizations should treat this as a prompt remediation item for any exposed or in-use installations.

Vendor
Valmet
Product
<=C2022
CVSS
HIGH 8.6
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-19
Original CVE updated
2026-02-19
Advisory published
2026-02-19
Advisory updated
2026-02-19

Who should care

OT/ICS operators, plant automation teams, and administrators responsible for Valmet DNA Engineering Web Tools deployments, especially older <=C2022 installations identified in the advisory corpus.

Technical summary

The supplied advisory text describes an unauthenticated attack path where URL manipulation leads to arbitrary file read access. The provided CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N (8.6), which indicates network reachability, no privileges, no user interaction, and a confidentiality impact. No integrity or availability impact is indicated in the supplied vector.

Defensive priority

High. Because the issue is unauthenticated, network-reachable, and capable of exposing files, it should be remediated quickly—especially where the web tools are reachable from broader enterprise or external networks.

Recommended defensive actions

  • Apply the Valmet fix referenced in the advisory and contact Valmet automation customer service for assistance if needed.
  • Restrict network access to Valmet DNA Engineering Web Tools to trusted management segments and avoid unnecessary exposure.
  • Review access logs and file-access related telemetry for unusual requests against the engineering web tools.
  • Validate whether any sensitive configuration, credential, or project files could have been exposed and rotate secrets if exposure is suspected.
  • Track the issue against the official CISA advisory and the vendor advisory for any follow-on guidance or additional affected versions.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory ICSA-26-050-02 and its linked official references. The corpus states: an unauthenticated attacker can manipulate the URL to achieve arbitrary file read access, and Valmet has issued a fix. The supplied vendor metadata is low-confidence and marked for review, so product naming should be verified against the official Valmet advisory before downstream use.

Official resources

Publicly disclosed by CISA in ICSA-26-050-02 on 2026-02-19, with the advisory corpus indicating that Valmet has issued a fix.