Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-101 |
|
Mon, 23 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys codesys
|
|
| CPEs | cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Codesys codesys
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys development System |
|
| Vendors & Products |
Codesys
Codesys development System |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context. | |
| Title | CODESYS Development System - Deserialization of Untrusted Data | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-12-01T13:59:26.310Z
Reserved: 2025-04-16T11:17:48.310Z
Link: CVE-2025-41700
Updated: 2025-12-01T13:59:21.545Z
Status : Analyzed
Published: 2025-12-01T10:16:00.440
Modified: 2026-02-23T15:35:10.653
Link: CVE-2025-41700
No data.
OpenCVE Enrichment
Updated: 2025-12-01T15:17:53Z