A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-011 |
|
History
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys codesys Hmi (sl) Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte (sl) Codesys control Rte \(for Beckhoff Cx\) Sl Codesys control Win (sl) Codesys runtime Toolkit Codesys virtual Control Sl |
|
| Vendors & Products |
Codesys
Codesys codesys Hmi (sl) Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte (sl) Codesys control Rte \(for Beckhoff Cx\) Sl Codesys control Win (sl) Codesys runtime Toolkit Codesys virtual Control Sl |
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution. | |
| Title | CODESYS Control Boot Application Replacement Enables Code Execution | |
| Weaknesses | CWE-669 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-24T13:16:02.920Z
Reserved: 2025-04-16T11:17:48.307Z
Link: CVE-2025-41660
Updated: 2026-03-24T13:15:57.857Z
Status : Awaiting Analysis
Published: 2026-03-24T08:16:00.230
Modified: 2026-03-24T15:53:48.067
Link: CVE-2025-41660
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:39:48Z