A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://certvde.com/de/advisories/VDE-2025-051 |
![]() ![]() |
History
Tue, 05 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Codesys
Codesys control |
|
Vendors & Products |
Codesys
Codesys control |
Mon, 04 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 04 Aug 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted. | |
Title | CODESYS Control PKI Exposure Enables Remote Certificate Access | |
Weaknesses | CWE-732 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-08-04T08:04:04.597Z
Updated: 2025-08-04T16:35:32.484Z
Reserved: 2025-04-16T11:17:48.307Z
Link: CVE-2025-41659

Updated: 2025-08-04T16:35:19.558Z

Status : Awaiting Analysis
Published: 2025-08-04T08:15:48.173
Modified: 2025-08-04T15:06:15.833
Link: CVE-2025-41659

No data.