An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

Subscriptions

Vendors Products
Codesys Subscribe
Control For Beaglebone Sl Subscribe
Control For Empc-a/imx6 Sl Subscribe
Control For Iot2000 Sl Subscribe
Control For Linux Arm Sl Subscribe
Control For Linux Sl Subscribe
Control For Pfc100 Sl Subscribe
Control For Pfc200 Sl Subscribe
Control For Plcnext Sl Subscribe
Control For Raspberry Pi Sl Subscribe
Control For Wago Touch Panels 600 Sl Subscribe
Control Rte (sl) Subscribe
Control Rte \(for Beckhoff Cx\) Sl Subscribe
Control Win (sl) Subscribe
Runtime Toolkit Subscribe
Virtual Control Sl Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl
Vendors & Products Codesys
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl

Tue, 24 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.
Title CODESYS Control Audit Log Format String DoS
Weaknesses CWE-134
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-24T07:42:33.820Z

Reserved: 2026-03-04T09:24:19.745Z

Link: CVE-2026-3509

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T08:16:01.657

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-3509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:48:52Z

Weaknesses