Description
The affected product may expose credentials remotely between low privileged visualization users during concurrent login operations due to insufficient isolation of authentication data. The vulnerability affects only login operations within an active visualization session.
Published: 2026-05-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from insufficient isolation of authentication data within CODESYS Visualization, allowing credentials to be exposed between low privileged users during concurrent login operations in an active session. This flaw leads to the disclosure of user credentials, enabling an attacker who can trigger such logins to gain unauthorized access to other accounts, corresponding to CWE‑522.

Affected Systems

Affected vendor and product are CODESYS: Visualization. No specific product versions or build numbers are listed in the advisory, so all releases remain potentially susceptible until an official patch is applied.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity vulnerability. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, which suggests there is no known mass exploitation. The likely attack vector is a remote authenticated user who logs into the visualization session and manually initiates concurrent logins, thereby leaking credentials to another low privileged user; this is inferred from the description of concurrent login operations within an active session.

Generated by OpenCVE AI on May 21, 2026 at 12:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the CODESYS vendor site or communication channels for an updated patch that addresses the credential isolation issue and deploy it immediately.
  • Restrict or disable concurrent login capabilities in the visualization user interface or configuration to prevent the overlap of authentication sessions that can lead to credential leakage.
  • Enable detailed audit logging for login events and regularly review logs for unusual patterns of concurrent logins between low privileged users, which could indicate exploitation attempts.

Generated by OpenCVE AI on May 21, 2026 at 12:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 11:30:00 +0000

Type Values Removed Values Added
Description The affected product may expose credentials remotely between low privileged visualization users during concurrent login operations due to insufficient isolation of authentication data. The vulnerability affects only login operations within an active visualization session.
Title CODESYS Visualization - Insufficiently Protected Credentials
First Time appeared Codesys
Codesys visualization
Weaknesses CWE-522
CPEs cpe:2.3:a:codesys:visualization:*:*:*:*:*:*:*:*
Vendors & Products Codesys
Codesys visualization
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Codesys Visualization
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-05-21T13:22:36.813Z

Reserved: 2025-11-27T14:02:51.635Z

Link: CVE-2026-0393

cve-icon Vulnrichment

Updated: 2026-05-21T13:22:20.955Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T12:16:19.810

Modified: 2026-05-21T16:04:33.830

Link: CVE-2026-0393

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T13:00:11Z

Weaknesses