Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27233 | An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affected engineering tool. These arbitrary commands are executed in the user context. |
| Link | Providers |
|---|---|
| https://certvde.com/en/advisories/VDE-2025-075 |
|
Tue, 09 Sep 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Sep 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Beckhoff
Beckhoff twincat |
|
| Vendors & Products |
Beckhoff
Beckhoff twincat |
Tue, 09 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated attacker can trick a local user into executing arbitrary commands by opening a deliberately manipulated project file with an affected engineering tool. These arbitrary commands are executed in the user context. | |
| Title | Beckhoff: Deserialization of untrusted data by TwinCAT 3 Engineering | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-09-09T19:32:19.683Z
Reserved: 2025-04-16T11:17:48.310Z
Link: CVE-2025-41701
Updated: 2025-09-09T19:32:15.827Z
Status : Deferred
Published: 2025-09-09T09:15:39.277
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41701
No data.
OpenCVE Enrichment
Updated: 2025-09-09T21:31:40Z
EUVD