Search criteria

7 vulnerabilities found for Control for Linux ARM SL by CODESYS

VAR-202105-1033

Vulnerability from variot - Updated: 2025-10-04 20:31

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. (DoS) It may be in a state. 3s-smart Software Solutions CODESYS Control is a set of industrial control program programming software from 3S-Smart Software Solutions (3s-smart Software Solutions) company in Germany

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1033",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "control for linux arm sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for pfc200 sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control rte",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "control runtime system toolkit",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "hmi",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "control runtime system toolkit",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for plcnext sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for linux arm sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for pfc200 sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "hmi",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "remote target visu toolkit",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "edge gateway",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "safety sil",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "edge gateway",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "plchandler",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "simulation runtime",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "control for plcnext sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control rte",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "safety sil",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for beaglebone sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "gateway",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "simulation runtime",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for beaglebone sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "gateway",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for empc-a\\/imx6 sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for wago touch panels 600 sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "embedded target visu toolkit",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "plchandler",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for iot2000 sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for wago touch panels 600 sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for iot2000 sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for pfc100 sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "opc server",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "control for linux sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for raspberry pi sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for pfc100 sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "control for empc-a\\/imx6 sl",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "4.1.0.0"
      },
      {
        "model": "embedded target visu toolkit",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "opc server",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for linux sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control for raspberry pi sl",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control win",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "remote target visu toolkit",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "edge gateway",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.5.17.0"
      },
      {
        "model": "control win",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "codesys",
        "version": "3.0"
      },
      {
        "model": "control win",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for empc-a/imx6 sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control rte",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "gateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for raspberry pi sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for pfc200 sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for linux sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for beaglebone sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for iot2000 sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      },
      {
        "model": "control for pfc100 sl",
        "scope": null,
        "trust": 0.8,
        "vendor": "codesys",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "cve": "CVE-2021-29242",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2021-29242",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-388815",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-29242",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 7.3,
            "baseSeverity": "High",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2021-29242",
            "impactScore": null,
            "integrityImpact": "Low",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-29242",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-29242",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202105-050",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-388815",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-29242",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router\u0027s addressing scheme and may re-route, add, remove or change low level communication packages. (DoS) It may be in a state. 3s-smart Software Solutions CODESYS Control is a set of industrial control program programming software from 3S-Smart Software Solutions (3s-smart Software Solutions) company in Germany",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-29242",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVNVU90492166",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-25-273-04",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-388815",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "id": "VAR-202105-1033",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-10-04T20:31:16.653000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Advisory\u00a02021-01 CODESYS",
        "trust": 0.8,
        "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=14640\u0026token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873\u0026download="
      },
      {
        "title": "3s-smart Software Solutions CODESYS Control Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150530"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.1
      },
      {
        "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://customers.codesys.com/index.php"
      },
      {
        "trust": 1.8,
        "url": "https://www.codesys.com/security/security-reports.html"
      },
      {
        "trust": 1.7,
        "url": "https://customers.codesys.com/index.php?eid=dumpfile\u0026t=f\u0026f=14640\u0026token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873\u0026download="
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29242"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu90492166/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-273-04"
      },
      {
        "trust": 0.1,
        "url": "https://customers.codesys.com/index.php?eid=dumpfile\u0026amp;t=f\u0026amp;f=14640\u0026amp;token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873\u0026amp;download="
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-05-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "date": "2021-05-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "date": "2021-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "date": "2022-01-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "date": "2021-05-03T14:15:07.667000",
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-09-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-388815"
      },
      {
        "date": "2021-05-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-29242"
      },
      {
        "date": "2021-05-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      },
      {
        "date": "2025-10-02T08:46:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      },
      {
        "date": "2021-09-14T18:18:36.333000",
        "db": "NVD",
        "id": "CVE-2021-29242"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "CODESYS\u00a0Control\u00a0Runtime\u00a0 Vulnerabilities related to input validation in systems",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-006714"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202105-050"
      }
    ],
    "trust": 0.6
  }
}

CVE-2025-41691 (GCVE-0-2025-41691)

Vulnerability from nvd – Published: 2025-08-04 08:04 – Updated: 2025-08-04 16:32
VLAI?
Title
CODESYS Control DoS via Unauthenticated NULL Pointer Dereference
Summary
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
CODESYS Control RTE (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control RTE (for Beckhoff CX) SL Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control Win (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS HMI (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41691",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T16:28:09.392670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T16:32:30.773Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (for Beckhoff CX) SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control Win (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HMI (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:04:34.981Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-070"
        }
      ],
      "source": {
        "advisory": "VDE-2025-070",
        "defect": [
          "CERT@VDE#641834"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Control DoS via Unauthenticated NULL Pointer Dereference",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41691",
    "datePublished": "2025-08-04T08:04:34.981Z",
    "dateReserved": "2025-04-16T11:17:48.309Z",
    "dateUpdated": "2025-08-04T16:32:30.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41659 (GCVE-0-2025-41659)

Vulnerability from nvd – Published: 2025-08-04 08:04 – Updated: 2025-08-04 16:35
VLAI?
Title
CODESYS Control PKI Exposure Enables Remote Certificate Access
Summary
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
CODESYS Control RTE (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control RTE (for Beckhoff CX) SL Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control Win (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS HMI (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Runtime Toolkit Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
Credits
Luca Borzacchiello from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41659",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T16:34:47.316036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T16:35:32.484Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (for Beckhoff CX) SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control Win (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HMI (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Runtime Toolkit",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Luca Borzacchiello from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:04:04.597Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-051"
        }
      ],
      "source": {
        "advisory": "VDE-2025-051",
        "defect": [
          "CERT@VDE#641801"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Control PKI Exposure Enables Remote Certificate Access",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41659",
    "datePublished": "2025-08-04T08:04:04.597Z",
    "dateReserved": "2025-04-16T11:17:48.307Z",
    "dateUpdated": "2025-08-04T16:35:32.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41658 (GCVE-0-2025-41658)

Vulnerability from nvd – Published: 2025-08-04 08:03 – Updated: 2025-08-04 11:52
VLAI?
Title
CODESYS Toolkit Exposes Sensitive Files via Default Permissions
Summary
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
CODESYS Runtime Toolkit Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
Credits
Luca Borzacchiello from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41658",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T11:52:31.347383Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T11:52:37.949Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Runtime Toolkit",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Luca Borzacchiello from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.\u003cbr\u003e"
            }
          ],
          "value": "CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:03:26.511Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-049"
        }
      ],
      "source": {
        "advisory": "VDE-2025-049",
        "defect": [
          "CERT@VDE#641799"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Toolkit Exposes Sensitive Files via Default Permissions",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41658",
    "datePublished": "2025-08-04T08:03:26.511Z",
    "dateReserved": "2025-04-16T11:17:48.306Z",
    "dateUpdated": "2025-08-04T11:52:37.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41691 (GCVE-0-2025-41691)

Vulnerability from cvelistv5 – Published: 2025-08-04 08:04 – Updated: 2025-08-04 16:32
VLAI?
Title
CODESYS Control DoS via Unauthenticated NULL Pointer Dereference
Summary
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
CODESYS Control RTE (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control RTE (for Beckhoff CX) SL Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control Win (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS HMI (SL) Affected: 3.5.21.10 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 4.16.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41691",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T16:28:09.392670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T16:32:30.773Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (for Beckhoff CX) SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control Win (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HMI (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "3.5.21.10",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "4.16.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:04:34.981Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-070"
        }
      ],
      "source": {
        "advisory": "VDE-2025-070",
        "defect": [
          "CERT@VDE#641834"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Control DoS via Unauthenticated NULL Pointer Dereference",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41691",
    "datePublished": "2025-08-04T08:04:34.981Z",
    "dateReserved": "2025-04-16T11:17:48.309Z",
    "dateUpdated": "2025-08-04T16:32:30.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41659 (GCVE-0-2025-41659)

Vulnerability from cvelistv5 – Published: 2025-08-04 08:04 – Updated: 2025-08-04 16:35
VLAI?
Title
CODESYS Control PKI Exposure Enables Remote Certificate Access
Summary
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
CODESYS Control RTE (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control RTE (for Beckhoff CX) SL Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control Win (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS HMI (SL) Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Runtime Toolkit Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 0.0.0.0 , < 4.17.0.0 (semver)
Create a notification for this product.
Credits
Luca Borzacchiello from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41659",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T16:34:47.316036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T16:35:32.484Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control RTE (for Beckhoff CX) SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control Win (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "HMI (SL)",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Runtime Toolkit",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.17.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Luca Borzacchiello from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:04:04.597Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-051"
        }
      ],
      "source": {
        "advisory": "VDE-2025-051",
        "defect": [
          "CERT@VDE#641801"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Control PKI Exposure Enables Remote Certificate Access",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41659",
    "datePublished": "2025-08-04T08:04:04.597Z",
    "dateReserved": "2025-04-16T11:17:48.307Z",
    "dateUpdated": "2025-08-04T16:35:32.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41658 (GCVE-0-2025-41658)

Vulnerability from cvelistv5 – Published: 2025-08-04 08:03 – Updated: 2025-08-04 11:52
VLAI?
Title
CODESYS Toolkit Exposes Sensitive Files via Default Permissions
Summary
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
CWE
  • CWE-276 - Incorrect Default Permissions
Assigner
Impacted products
Vendor Product Version
CODESYS Runtime Toolkit Affected: 0.0.0.0 , < 3.5.21.20 (semver)
Create a notification for this product.
    CODESYS Control for BeagleBone SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for emPC-A/iMX6 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for IOT2000 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux ARM SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Linux SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC100 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PFC200 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for PLCnext SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for Raspberry Pi SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Control for WAGO Touch Panels 600 SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
    CODESYS Virtual Control SL Affected: 0.0.0.0 , < 4.16.0.0 (semver)
Create a notification for this product.
Credits
Luca Borzacchiello from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41658",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-04T11:52:31.347383Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-04T11:52:37.949Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Runtime Toolkit",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "3.5.21.20",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for BeagleBone SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for emPC-A/iMX6 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for IOT2000 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux ARM SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Linux SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC100 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PFC200 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for PLCnext SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for Raspberry Pi SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Control for WAGO Touch Panels 600 SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Virtual Control SL",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "4.16.0.0",
              "status": "affected",
              "version": "0.0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Luca Borzacchiello from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.\u003cbr\u003e"
            }
          ],
          "value": "CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T08:03:26.511Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-049"
        }
      ],
      "source": {
        "advisory": "VDE-2025-049",
        "defect": [
          "CERT@VDE#641799"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Toolkit Exposes Sensitive Files via Default Permissions",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41658",
    "datePublished": "2025-08-04T08:03:26.511Z",
    "dateReserved": "2025-04-16T11:17:48.306Z",
    "dateUpdated": "2025-08-04T11:52:37.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}