A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

Subscriptions

Vendors Products
Codesys Subscribe
Codesys Hmi (sl) Subscribe
Control For Beaglebone Sl Subscribe
Control For Empc-a/imx6 Sl Subscribe
Control For Iot2000 Sl Subscribe
Control For Linux Arm Sl Subscribe
Control For Linux Sl Subscribe
Control For Pfc100 Sl Subscribe
Control For Pfc200 Sl Subscribe
Control For Plcnext Sl Subscribe
Control For Raspberry Pi Sl Subscribe
Control For Wago Touch Panels 600 Sl Subscribe
Control Rte (sl) Subscribe
Control Rte \(for Beckhoff Cx\) Sl Subscribe
Control Win (sl) Subscribe
Runtime Toolkit Subscribe
Virtual Control Sl Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl
Vendors & Products Codesys
Codesys codesys Hmi (sl)
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Title CODESYS Control Boot Application Replacement Enables Code Execution
Weaknesses CWE-669
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-24T13:16:02.920Z

Reserved: 2025-04-16T11:17:48.307Z

Link: CVE-2025-41660

cve-icon Vulnrichment

Updated: 2026-03-24T13:15:57.857Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T08:16:00.230

Modified: 2026-03-24T15:53:48.067

Link: CVE-2025-41660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:48:53Z

Weaknesses