CVE-2025-41659
- EPSS 0.03%
- Veröffentlicht 04.08.2025 08:15:48
- Zuletzt bearbeitet 04.08.2025 15:06:15
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all servic...
CVE-2025-41691
- EPSS 0.12%
- Veröffentlicht 04.08.2025 08:15:48
- Zuletzt bearbeitet 04.08.2025 15:06:15
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
CVE-2025-41658
- EPSS 0.01%
- Veröffentlicht 04.08.2025 08:15:47
- Zuletzt bearbeitet 04.08.2025 15:06:15
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
CVE-2025-0694
- EPSS 0.06%
- Veröffentlicht 18.03.2025 11:15:39
- Zuletzt bearbeitet 18.03.2025 11:15:39
Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.
CVE-2024-8175
- EPSS 0.62%
- Veröffentlicht 25.09.2024 08:15:04
- Zuletzt bearbeitet 26.09.2024 13:32:02
An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.
CVE-2024-5000
- EPSS 0.81%
- Veröffentlicht 04.06.2024 09:15:09
- Zuletzt bearbeitet 21.11.2024 09:46:44
An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.
CVE-2023-6357
- EPSS 0.28%
- Veröffentlicht 05.12.2023 15:15:08
- Zuletzt bearbeitet 21.11.2024 08:43:41
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
CVE-2021-29242
- EPSS 0.44%
- Veröffentlicht 03.05.2021 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:00:52
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.