A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
History

Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys control
Vendors & Products Codesys
Codesys control

Mon, 04 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
Title CODESYS Control PKI Exposure Enables Remote Certificate Access
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-08-04T08:04:04.597Z

Updated: 2025-08-04T16:35:32.484Z

Reserved: 2025-04-16T11:17:48.307Z

Link: CVE-2025-41659

cve-icon Vulnrichment

Updated: 2025-08-04T16:35:19.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-04T08:15:48.173

Modified: 2025-08-04T15:06:15.833

Link: CVE-2025-41659

cve-icon Redhat

No data.