A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl
Vendors & Products Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Title CODESYS Control Boot Application Replacement Enables Code Execution
Weaknesses CWE-669
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-24T13:16:02.920Z

Reserved: 2025-04-16T11:17:48.307Z

Link: CVE-2025-41660

cve-icon Vulnrichment

Updated: 2026-03-24T13:15:57.857Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T08:16:00.230

Modified: 2026-03-24T15:53:48.067

Link: CVE-2025-41660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:39:48Z