Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6679 | An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2025-022 |
|
Tue, 18 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Mar 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy. | |
| Title | CODESYS Control V3 - OPC UA Server Authentication bypass | |
| Weaknesses | CWE-203 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-03-18T13:16:26.068Z
Reserved: 2025-02-19T08:38:43.010Z
Link: CVE-2025-1468
Updated: 2025-03-18T13:16:21.793Z
Status : Deferred
Published: 2025-03-18T11:15:39.553
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1468
No data.
OpenCVE Enrichment
No data.
EUVD