关键漏洞信息 漏洞ID VDC-2025-051 发布日期与更新 发布日期: 2025-08-04 12:00 (CET) 最后更新: 2025-08-01 14:03 (CEST) 影响产品及版本 CODESYS Control for BeagleBone SL < 4.17.0.0 CODESYS Control for enPC-AVMX6 SL < 4.17.0.0 CODESYS Control for KDI7000 SL < 4.17.0.0 CODESYS Control for Linux ARM SL < 4.17.0.0 CODESYS Control for Linux SL < 4.17.0.0 CODESYS Control for PPC603 SL < 4.17.0.0 CODESYS Control for PPC930 SL < 4.17.0.0 CODESYS Control for Pi.Creat SL < 4.17.0.0 CODESYS Control for Raspberry Pi SL < 4.17.0.0 CODESYS Control for WAGO Touch Panels 600 SL < 4.17.0.0 CODESYS Control RTE (for Beckhoff CX) SL < 3.5.21.20 CODESYS Control RTE (SL) < 3.5.21.20 CODESYS Control Win (SL) < 3.5.21.20 CODESYS HMI (SL) < 3.5.21.20 CODESYS Runtime Toolkit < 3.5.21.20 CODESYS Virtual Control SL < 4.17.0.0 漏洞描述 漏洞存在于CODESYS Control运行时系统中,允许低权限远程攻击者通过CODESYS协议访问PKI文件夹,从而读取和写入证书和密钥。这暴露了敏感的加密数据,并允许未经授权的证书被信任。 CVE ID CVE-2025-41859 严重性 CVSS v3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L 评分: 8.3 弱点类型 不正确的权限分配(CWE-732) 影响 未经授权访问PKI文件夹允许攻击者提取敏感的加密密钥并操纵受信证书。这破坏了系统的完整性、机密性和部分影响可用性。 解决方案 更新以下产品到版本3.5.21.20: - CODESYS Control RTE (SL) - CODESYS Control RTE (for Beckhoff® CX) SL - CODESYS Control Win (SL) - CODESYS HMI (SL) - CODESYS Runtime Toolkit 更新以下产品到版本4.17.0.0: - CODESYS Control for BeagleBone SL - CODESYS Control for enPC-AVMX6 SL - CODESYS Control for KDI7000 SL - CODESYS Control for Linux ARM SL - CODESYS Control for Linux SL - CODESYS Control for PPC603 SL - CODESYS Control for PPC930 SL - CODESYS Control for Pi.Creat SL - CODESYS Control for Raspberry Pi SL - CODESYS Control for WAGO Touch Panels 600 SL - CODESYS Virtual Control SL 报告者 CERT@VDE协调CODESYS GmbH Luca Alfonzocciello来自Nozomi Networks报告