CVE-2025-41659: CWE-732 Incorrect Permission Assignment for Critical Resource in CODESYS Control RTE (SL)
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
AI Analysis
Technical Summary
CVE-2025-41659 is a high-severity vulnerability affecting the CODESYS Control Runtime Environment (RTE) for SL devices. The root cause is an incorrect permission assignment (CWE-732) that allows a low-privileged remote attacker to access the PKI folder within the runtime system. This folder contains critical cryptographic assets such as certificates and private keys. By exploiting this vulnerability, an attacker can read and write these certificates and keys, enabling them to extract sensitive data or manipulate trust relationships by accepting malicious certificates as trusted. Although the services running on the device remain operational, the deletion or tampering of certificates forces communication to fall back to unencrypted channels, significantly weakening security. The vulnerability has a CVSS 3.1 base score of 8.3, reflecting high impact on confidentiality and integrity, with low attack complexity and no user interaction required. The vulnerability does not currently have known exploits in the wild, but its potential for misuse in industrial control systems is significant given the critical role of CODESYS in automation environments.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a serious risk. CODESYS Control RTE is widely used in programmable logic controllers (PLCs) and embedded control systems that manage industrial processes. Unauthorized access to PKI materials can lead to interception or manipulation of encrypted communications, undermining the integrity and confidentiality of operational data. Attackers could impersonate legitimate devices or controllers by injecting trusted certificates, facilitating man-in-the-middle attacks or unauthorized command execution. Although availability is not directly impacted, the fallback to unencrypted communication increases exposure to eavesdropping and data tampering. This could result in operational disruptions, intellectual property theft, or safety hazards. The vulnerability's remote exploitability and low privilege requirement increase the attack surface, making it a critical concern for European industrial operators who rely on secure automation systems to comply with regulatory standards such as NIS2 and GDPR.
Mitigation Recommendations
Immediate mitigation should focus on restricting access permissions to the PKI folder within the CODESYS Control RTE environment, ensuring that only highly privileged system processes and administrators can read or write certificate files. Network segmentation should be enforced to isolate control systems from less trusted networks, limiting remote access vectors. Implement strict access control lists (ACLs) and monitor file integrity of PKI assets to detect unauthorized changes promptly. Deploy network intrusion detection systems (NIDS) with signatures or heuristics tailored to detect anomalous access patterns to the PKI folder or certificate manipulation attempts. Since no patch links are currently available, organizations should engage with CODESYS support for guidance on upcoming patches or workarounds. Additionally, enforce multi-factor authentication for administrative access and conduct regular audits of certificate trust stores to identify and revoke any unauthorized certificates. Finally, ensure that backup copies of certificates and keys are securely stored offline to enable rapid recovery if tampering occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-41659: CWE-732 Incorrect Permission Assignment for Critical Resource in CODESYS Control RTE (SL)
Description
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
AI-Powered Analysis
Technical Analysis
CVE-2025-41659 is a high-severity vulnerability affecting the CODESYS Control Runtime Environment (RTE) for SL devices. The root cause is an incorrect permission assignment (CWE-732) that allows a low-privileged remote attacker to access the PKI folder within the runtime system. This folder contains critical cryptographic assets such as certificates and private keys. By exploiting this vulnerability, an attacker can read and write these certificates and keys, enabling them to extract sensitive data or manipulate trust relationships by accepting malicious certificates as trusted. Although the services running on the device remain operational, the deletion or tampering of certificates forces communication to fall back to unencrypted channels, significantly weakening security. The vulnerability has a CVSS 3.1 base score of 8.3, reflecting high impact on confidentiality and integrity, with low attack complexity and no user interaction required. The vulnerability does not currently have known exploits in the wild, but its potential for misuse in industrial control systems is significant given the critical role of CODESYS in automation environments.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a serious risk. CODESYS Control RTE is widely used in programmable logic controllers (PLCs) and embedded control systems that manage industrial processes. Unauthorized access to PKI materials can lead to interception or manipulation of encrypted communications, undermining the integrity and confidentiality of operational data. Attackers could impersonate legitimate devices or controllers by injecting trusted certificates, facilitating man-in-the-middle attacks or unauthorized command execution. Although availability is not directly impacted, the fallback to unencrypted communication increases exposure to eavesdropping and data tampering. This could result in operational disruptions, intellectual property theft, or safety hazards. The vulnerability's remote exploitability and low privilege requirement increase the attack surface, making it a critical concern for European industrial operators who rely on secure automation systems to comply with regulatory standards such as NIS2 and GDPR.
Mitigation Recommendations
Immediate mitigation should focus on restricting access permissions to the PKI folder within the CODESYS Control RTE environment, ensuring that only highly privileged system processes and administrators can read or write certificate files. Network segmentation should be enforced to isolate control systems from less trusted networks, limiting remote access vectors. Implement strict access control lists (ACLs) and monitor file integrity of PKI assets to detect unauthorized changes promptly. Deploy network intrusion detection systems (NIDS) with signatures or heuristics tailored to detect anomalous access patterns to the PKI folder or certificate manipulation attempts. Since no patch links are currently available, organizations should engage with CODESYS support for guidance on upcoming patches or workarounds. Additionally, enforce multi-factor authentication for administrative access and conduct regular audits of certificate trust stores to identify and revoke any unauthorized certificates. Finally, ensure that backup copies of certificates and keys are securely stored offline to enable rapid recovery if tampering occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.307Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68906ca0ad5a09ad00df58ff
Added to database: 8/4/2025, 8:17:36 AM
Last enriched: 8/4/2025, 8:33:01 AM
Last updated: 9/1/2025, 7:17:09 PM
Views: 21
Related Threats
CVE-2025-9815: Missing Authentication in alaneuler batteryKid
HighCVE-2025-9814: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9813: Buffer Overflow in Tenda CH22
HighCVE-2025-9812: Buffer Overflow in Tenda CH22
HighCVE-2025-9811: SQL Injection in Campcodes Farm Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.