{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T08:36:45.356","vulnerabilities":[{"cve":{"id":"CVE-2018-20025","sourceIdentifier":"vulnerability@kaspersky.com","published":"2019-02-19T21:29:00.243","lastModified":"2024-11-21T04:00:46.897","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0."},{"lang":"es","value":"Existen valores aleatorios utilizados de manera insuficiente en los productos de CODESYS, en sus versiones V3 anteriores a la V3.5.14.0."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"30E5A50D-470A-4C7D-A634-E97AE95B38B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"455BEF47-4D2A-4314-AF1D-C5C46236B135"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"D2E52640-4AA9-40C1-A00E-374334F761C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"C87347FA-38EA-4299-A822-63FCF0E34577"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"8D3E05BC-83BC-49C8-91AD-64A1EE9D36BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"40D2875A-E1DF-4C7D-9DD7-7BE8D617EF3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"EE9699B0-CCE3-42AB-8208-492382D59582"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"20CFD36A-208D-444C-A3C3-C2B11CAF65AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"6368AFD2-D0F4-4E93-9D28-00D2DAF6F1BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"1E623E98-8040-43D2-81B5-D6B06B374472"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"AA6D880C-195D-4830-B0B5-7D7BC32182B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"087FE9CF-7492-416A-9585-0E8C00ABB320"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"498AB0A1-C9F2-40A5-BC72-9CC4F96D74DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"63F51840-0A93-43BD-B8D0-145C7C52C7B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.14.0","matchCriteriaId":"6C0A629A-E3CE-428A-81C1-25965A681B73"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/106251","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/","source":"vulnerability@kaspersky.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04","source":"vulnerability@kaspersky.com"},{"url":"http://www.securityfocus.com/bid/106251","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}