CVE-2025-1468

7.5 HIGH

📋 TL;DR

An unauthenticated remote attacker can access sensitive authentication information in CODESYS OPC UA Server when using the non-default Basic128Rsa15 security policy. This affects systems running vulnerable versions of CODESYS OPC UA Server with this specific security policy enabled.

💻 Affected Systems

Products:
  • CODESYS OPC UA Server
Versions: Specific versions not detailed in reference; check vendor advisory
Operating Systems: All supported platforms
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using the non-default Basic128Rsa15 security policy

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full authentication credentials, potentially leading to complete system compromise, data theft, or operational disruption.

🟠

Likely Case

Unauthenticated attackers extract authentication information, enabling further attacks on the system or connected industrial control systems.

🟢

If Mitigated

With proper controls, impact is limited to information disclosure without system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access and the specific security policy configuration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2025-022

Restart Required: No

Instructions:

1. Apply vendor patch for CODESYS OPC UA Server. 2. Verify Basic128Rsa15 policy is disabled or updated. 3. Test functionality after patching.

🔧 Temporary Workarounds

Disable Basic128Rsa15 Security Policy

all

Switch to a different security policy that is not vulnerable

Configure OPC UA Server to use alternative security policies like Basic256Sha256

🧯 If You Can't Patch

  • Network segmentation: Isolate CODESYS OPC UA Server from untrusted networks
  • Access controls: Restrict network access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check if CODESYS OPC UA Server is configured with Basic128Rsa15 security policy enabled

Check Version:

Check CODESYS version through management interface or system logs

Verify Fix Applied:

Verify patch version and confirm Basic128Rsa15 policy is disabled or updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • OPC UA security policy configuration changes

Network Indicators:

  • Unauthenticated OPC UA requests to Basic128Rsa15 endpoints

SIEM Query:

OPC UA protocol anomalies with Basic128Rsa15 policy

🔗 References

📤 Share & Export