8.3

CVE-2025-41659

A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCODESYS
Produkt Control RTE (SL)
Default Statusunaffected
Version < 3.5.21.20
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control RTE (for Beckhoff CX) SL
Default Statusunaffected
Version < 3.5.21.20
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control Win (SL)
Default Statusunaffected
Version < 3.5.21.20
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt HMI (SL)
Default Statusunaffected
Version < 3.5.21.20
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Runtime Toolkit
Default Statusunaffected
Version < 3.5.21.20
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for BeagleBone SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for emPC-A/iMX6 SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for IOT2000 SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for Linux ARM SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for Linux SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for PFC100 SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for PFC200 SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for PLCnext SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for Raspberry Pi SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Control for WAGO Touch Panels 600 SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
HerstellerCODESYS
Produkt Virtual Control SL
Default Statusunaffected
Version < 4.17.0.0
Version 0.0.0.0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.128
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
info@cert.vde.com 8.3 2.8 5.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.