CISA reports multiple vulnerabilities in Emerson ValveLink products, at least one critical
Take action: If you have Emerson ValveLink products (SOLO, DTM, PRM, or SNAP-ON), make sure it's isolated from the internet and accessible only from trusted networks. Then check your version and plan an upgrade to ValveLink 14.0. The issues may not be immediately exploitable, but given enough time it will be exploited. Plan a regular patch.
Learn More
CISA is reporting multiple security vulnerabilities in Emerson's ValveLink product line, potentially allowing attackers to read sensitive information, tamper with system parameters, and execute unauthorized code on critical manufacturing systems.
Vulnerabilities summary
- CVE-2025-52579 (CVSS score 9.3) - Cleartext Storage of Sensitive Information in Memory. The ValveLink product stores sensitive information in cleartext in memory. This sensitive memory data may be saved to disk, stored in core dumps, or remain uncleared if the product crashes or if memory is not properly cleared before being freed.
- CVE-2025-50109 (CVSS score 8.5) - Cleartext Storage of Sensitive Information in Memory
- CVE-2025-46358 (CVSS score 8.5) - Protection Mechanism Failure
- CVE-2025-48496 (CVSS score 5.9) - Uncontrolled Search Path Element
- CVE-2025-53471 (CVSS score 5.9) - Improper Input Validation
The vulnerabilities impact all versions of the following ValveLink products prior to version 14.0:
- ValveLink SOLO: All versions prior to ValveLink 14.0 ValveLink DTM: All versions prior to ValveLink 14.0
ValveLink PRM: All versions prior to ValveLink 14.0 ValveLink SNAP-ON: All versions prior to ValveLink 14.0
Emerson has released patches in ValveLink version 14.0. Organizations using affected ValveLink products should immediately update to ValveLink 14.0 or later versions. The software upgrade can be downloaded directly from the Emerson website, and detailed information is available in the associated Emerson security notification.
No known public exploitation targeting these vulnerabilities has been reported to CISA at this time.