Skip to main content
Advisories

Securing Critical Infrastructure: Vulnerabilities in Valmet DNA (CVE-2025-0416, CVE-2025-0417, CVE-2025-0418)

By 9. April 2025April 10th, 2025No Comments
In an increasingly connected industrial world, cybersecurity risks are ever-present—especially when they affect critical process control systems like Valmet DNA. Valmet DNA is an automation and control system widely deployed across pulp, paper, and energy industries to manage and monitor essential production processes.
As part security assessment of the company’s operational technology environment, our team of specialized OT Penetration Testers uncovered three  vulnerabilities that could have had serious consequences if discovered by malicious actors. More specifically, Limes Security’s industrial cybersecurity experts identified three critical vulnerabilities (published as CVE-2025-0416, CVE-2025-0417 and CVE-2025-0418) that could allow an attacker to gain unrestricted access, read plaintext passwords, or escalate privileges to take full control of the system.
This successful assessment highlights both the value of proactive security testing and Limes Security’s expertise in industrial control system penetration testing. The vulnerabilities discovered presented real risks to operational continuity, data integrity, and system security. This article shares the findings, their potential impact, and how our collaborative approach to disclosure helped secure critical infrastructure for all Valmet DNA users worldwide.

Lack of protection against brute force attacks

An arbitrary number of login attempts can be made via the Valmet DNA operator user interface without the user being blocked.

CVSS v4.0 Score

Product:

Valmet DNA

Affected Version:

All Valmet DNA Operate versions

CVE / Vendor ID:

CVE-2025-0417

Found by

Felix Eberstaller & Sixtus Leonhardsberger
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green

The affected application does not properly sanitize input data before sending it to the SQL server. This could allow an attacker with access to the application could use this vulnerability to execute malicious SQL commands to compromise the whole database.

User passwords in plain text

Passwords of Valmet DNA users are stored in plain text within the Valmet DNA function blocks.

CVSS v4.0 Score

Product:

Valmet DNA

Affected Version:

Valmet DNA Operate versions C2021 and older

CVE / Vendor ID:

CVE-2025-0418

Found by

Felix Eberstaller & Sixtus Leonhardsberger
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green

This practice poses a security risk as attackers who gain access to local project data can read the passwords.

Local privilege escalation through insecure DCOM configuration

It is possible to gain SYSTEM privileges as any local user via a permission issue in the DCOM object.

CVSS v4.0 Score

Product:

Valmet DNA

Affected Version:

Valmet DNA Operate versions C2022 and older

CVE / Vendor ID:

CVE-2025-0416

Found by

Felix Eberstaller & Sixtus Leonhardsberger
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green

The DCOM object Valmet DNA Engineering has permissions that allow it to run commands as a user with the SeImpersonatePrivilege privilege. The SeImpersonatePrivilege privilege is a Windows permission that allows a process to impersonate another user. An attacker can use this vulnerability to escalate their privileges and take complete control of the system.

Your security is our mission. Let’s defend what matters!