Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-100 |
|
Mon, 01 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte Codesys control Rte (sl) Codesys control Win (sl) Codesys hmi (sl) Codesys remote Target Visu Codesys runtime Toolkit Codesys virtual Control Sl |
|
| Vendors & Products |
Codesys
Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte Codesys control Rte (sl) Codesys control Win (sl) Codesys hmi (sl) Codesys remote Target Visu Codesys runtime Toolkit Codesys virtual Control Sl |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition. | |
| Title | CODESYS Control - Invalid type usage in visualization | |
| Weaknesses | CWE-843 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-12-01T14:00:28.509Z
Reserved: 2025-04-16T11:17:48.320Z
Link: CVE-2025-41738
Updated: 2025-12-01T14:00:21.533Z
Status : Awaiting Analysis
Published: 2025-12-01T10:16:01.130
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-41738
No data.
OpenCVE Enrichment
Updated: 2025-12-01T16:28:43Z