8.3
CVE-2025-41659
- EPSS 0.04%
- Veröffentlicht 04.08.2025 08:15:48
- Zuletzt bearbeitet 04.08.2025 15:06:15
- Quelle info@cert.vde.com
- CVE-Watchlists
- Unerledigt
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCODESYS
≫
Produkt
Control RTE (SL)
Default Statusunaffected
Version <
3.5.21.20
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control RTE (for Beckhoff CX) SL
Default Statusunaffected
Version <
3.5.21.20
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control Win (SL)
Default Statusunaffected
Version <
3.5.21.20
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
HMI (SL)
Default Statusunaffected
Version <
3.5.21.20
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Runtime Toolkit
Default Statusunaffected
Version <
3.5.21.20
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for BeagleBone SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for emPC-A/iMX6 SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for IOT2000 SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for Linux ARM SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for Linux SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for PFC100 SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for PFC200 SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for PLCnext SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for Raspberry Pi SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Control for WAGO Touch Panels 600 SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
HerstellerCODESYS
≫
Produkt
Virtual Control SL
Default Statusunaffected
Version <
4.17.0.0
Version
0.0.0.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.128 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| info@cert.vde.com | 8.3 | 2.8 | 5.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.