- Description
- An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.
- Source
- info@cert.vde.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- info@cert.vde.com
- CWE-203
- Hype score
- Not currently trending
🚨 CVE-2025-1468 🔴 HIGH (7.5) 🏢 CODESYS - CODESYS Runtime Toolkit 🏗️ 0 🔗 https://t.co/n8fFkFtW44 #CyberCron #VulnAlert #InfoSec https://t.co/3KQbBHyXei
@cybercronai
18 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJyEiR (CVE-2025-1468 | CODESYS Runtime Toolkit 2.4.7.56/2.4.7.57/3.5.17.10 Basic128Rsa15 Security Policy information exposure (VDE-2025-022)) has been published on https://t.co/Y4rFfoBJfG
@WolfgangSesin
18 Mar 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-1468 - CODESYS OPC UA Server - HIGH 🚨 🗓️ Date published 2025-03-18 11:15:39 UTC #CODESYSOPCUAServer #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/INptFC9irm
@vulns_space
18 Mar 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-1468 An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default B… https://t.co/nxxnnrZ1S7
@CVEnew
18 Mar 2025
349 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes