Description
A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Published: 2026-03-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A low‑privileged remote attacker may replace the boot application of the CODESYS Control runtime system. This replacement allows the attacker to run arbitrary code when the device boots, effectively granting full control over the system. The weakness involves unauthorized modification of a critical component (CWE‑669).

Affected Systems

The vulnerability affects multiple CODESYS Control products, including CODESYS Control RTE for standard Linux (SL) and Beckhoff CX, CODESYS Control Win (SL), CODESYS Control for BeagleBone, IOT2000, Linux ARM, generic Linux, PFC100, PFC200, PLCnext, Raspberry Pi, WAGO Touch Panels 600, emPC‑A/iMX6, as well as the CODESYS HMI, Runtime Toolkit, and Virtual Control SL editions.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability, and although EPSS data is not available, the vulnerability is exploitable by an attacker with low privileges. The attack vector is likely remote, inferred from the description that a remote attacker can replace the boot application. The vulnerability is not yet listed in the CISA KEV catalog, but its high impact and remote nature warrant immediate attention.

Generated by OpenCVE AI on March 24, 2026 at 09:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the latest vendor patch or upgrade that removes the vulnerability.
  • Restrict remote access to the CODESYS Control runtime by limiting connections to trusted networks or applying firewall rules.
  • Disable or lock the boot application directory or files to prevent unauthorized modification.
  • Enforce strict role‑based access controls so that only privileged users can modify boot configuration files.
  • Monitor system logs for any abnormal attempts to change boot application files.
  • If a patch is not yet available, consider isolating the device from untrusted networks and restricting physical access.

Generated by OpenCVE AI on March 24, 2026 at 09:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl
Vendors & Products Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Title CODESYS Control Boot Application Replacement Enables Code Execution
Weaknesses CWE-669
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Codesys Codesys Hmi (sl) Control For Beaglebone Sl Control For Empc-a/imx6 Sl Control For Iot2000 Sl Control For Linux Arm Sl Control For Linux Sl Control For Pfc100 Sl Control For Pfc200 Sl Control For Plcnext Sl Control For Raspberry Pi Sl Control For Wago Touch Panels 600 Sl Control Rte (sl) Control Rte \(for Beckhoff Cx\) Sl Control Win (sl) Runtime Toolkit Virtual Control Sl
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-24T13:16:02.920Z

Reserved: 2025-04-16T11:17:48.307Z

Link: CVE-2025-41660

cve-icon Vulnrichment

Updated: 2026-03-24T13:15:57.857Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T08:16:00.230

Modified: 2026-03-24T15:53:48.067

Link: CVE-2025-41660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:39:48Z

Weaknesses