Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23491 | A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-051 |
|
Tue, 05 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys control |
|
| Vendors & Products |
Codesys
Codesys control |
Mon, 04 Aug 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted. | |
| Title | CODESYS Control PKI Exposure Enables Remote Certificate Access | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-08-04T16:35:32.484Z
Reserved: 2025-04-16T11:17:48.307Z
Link: CVE-2025-41659
Updated: 2025-08-04T16:35:19.558Z
Status : Awaiting Analysis
Published: 2025-08-04T08:15:48.173
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-41659
No data.
OpenCVE Enrichment
Updated: 2025-08-05T11:38:58Z
EUVD