CVE-2025-0694

6.6 MEDIUM

📋 TL;DR

CVE-2025-0694 is a path traversal vulnerability in CODESYS Control that allows attackers with physical access and low privileges to bypass file system restrictions. This affects industrial control systems using vulnerable CODESYS versions, potentially compromising operational technology environments.

💻 Affected Systems

Products:
  • CODESYS Control
Versions: Specific versions not detailed in reference; check VDE advisory for exact affected versions
Operating Systems: Windows, Linux-based real-time systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with physical access to CODESYS Control runtime. Industrial control systems in manufacturing, energy, and infrastructure sectors are particularly at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full filesystem access leading to complete system compromise, manipulation of PLC programs, disruption of industrial processes, and potential safety incidents.

🟠

Likely Case

Unauthorized file access, configuration tampering, and potential lateral movement within industrial networks.

🟢

If Mitigated

Limited impact with proper physical access controls and network segmentation in place.

🌐 Internet-Facing: LOW (requires physical access to exploit)
🏢 Internal Only: MEDIUM (requires physical access but could be exploited by insiders or attackers who gain physical access to facilities)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical access to the system and low-privilege credentials. The path traversal nature suggests straightforward exploitation once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check VDE advisory for specific patched versions

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2025-015

Restart Required: Yes

Instructions:

1. Review VDE advisory VDE-2025-015. 2. Identify affected CODESYS Control versions. 3. Apply vendor-provided patches. 4. Restart affected systems. 5. Verify patch application.

🔧 Temporary Workarounds

Restrict Physical Access

all

Implement strict physical security controls to prevent unauthorized access to industrial control systems.

Network Segmentation

all

Isolate CODESYS Control systems from other networks using firewalls and network segmentation.

🧯 If You Can't Patch

  • Implement strict physical access controls with logging and monitoring
  • Apply principle of least privilege to user accounts and file system permissions

🔍 How to Verify

Check if Vulnerable:

Check CODESYS Control version against affected versions listed in VDE-2025-015 advisory.

Check Version:

Check CODESYS Control version through CODESYS development environment or system administration tools

Verify Fix Applied:

Verify CODESYS Control version is updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file access attempts
  • Path traversal patterns in file operations
  • Unusual file system activity from low-privilege accounts

Network Indicators:

  • Unusual network traffic from industrial control systems
  • Attempts to access restricted file paths

SIEM Query:

source="codesys" AND (event_type="file_access" AND path="*../*")

🔗 References

📤 Share & Export