Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23492 | CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions. |
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-049 |
|
Tue, 05 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys control |
|
| Vendors & Products |
Codesys
Codesys control |
Mon, 04 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 Aug 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions. | |
| Title | CODESYS Toolkit Exposes Sensitive Files via Default Permissions | |
| Weaknesses | CWE-276 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-08-04T11:52:37.949Z
Reserved: 2025-04-16T11:17:48.306Z
Link: CVE-2025-41658
Updated: 2025-08-04T11:52:34.939Z
Status : Deferred
Published: 2025-08-04T08:15:47.950
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41658
No data.
OpenCVE Enrichment
Updated: 2025-08-05T11:38:59Z
EUVD