Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-41738— CODESYS Control - Invalid type usage in visualization

CVSS 7.5 · High EPSS 0.10% · P26
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-41738

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
CODESYS Control - Invalid type usage in visualization
Source: NVD (National Vulnerability Database)
Vulnerability Description
An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不兼容类型访问资源(类型混淆)
Source: NVD (National Vulnerability Database)
Vulnerability Title
CODESYS Control 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CODESYS Control是德国CODESYS公司的一套工业控制程序编程软件。 CODESYS Control存在安全漏洞,该漏洞源于未经身份验证的远程攻击者可导致CODESYS Control运行时系统的可视化服务器访问错误类型指针的资源,可能导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CODESYSCODESYS Control RTE (SL) 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS Control RTE (for Beckhoff CX) SL 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS Control Win (SL) 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS HMI (SL) 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS Remote Target Visu 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS Runtime Toolkit 3.5.18.0 ~ 3.5.21.40 -
CODESYSCODESYS Control for BeagleBone SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for emPC-A/iMX6 SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for IOT2000 SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for Linux ARM SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for Linux SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for PFC100 SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for PFC200 SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for PLCnext SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for Raspberry Pi SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Control for WAGO Touch Panels 600 SL 4.5.0.0 ~ 4.19.0.0 -
CODESYSCODESYS Virtual Control SL 4.5.0.0 ~ 4.19.0.0 -

II. Public POCs for CVE-2025-41738

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-41738

登录查看更多情报信息。

Same Patch Batch · CODESYS · 2025-12-01 · 3 CVEs total

CVE-2025-417007.8 HIGHCODESYS Development System - Deserialization of Untrusted Data
CVE-2025-417395.9 MEDIUMCODESYS Control - Linux/QNX SysSocket flaw

IV. Related Vulnerabilities

V. Comments for CVE-2025-41738

No comments yet


Leave a comment