Description
An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.
Published: 2026-03-24
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial‑of‑service
Action: Patch
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary format specifiers into audit log messages processed by the CODESYS Control runtime system. By sending a carefully crafted log entry, an unauthenticated remote user can cause the audit logger to crash or consume excessive resources, resulting in a denial‑of‑service condition. This is a classic format string weakness, identified as CWE-134.

Affected Systems

The affected software is the CODESYS Control runtime platform, including CODESYS Control RTE (SL), CODESYS Control RTE (for Beckhoff CX) SL, CODESYS Control Win (SL), CODESYS Control for BeagleBone SL, CODESYS Control for IOT2000 SL, CODESYS Control for Linux ARM SL, CODESYS Control for Linux SL, CODESYS Control for PFC100 SL, CODESYS Control for PFC200 SL, CODESYS Control for PLCnext SL, CODESYS Control for Raspberry Pi SL, CODESYS Control for WAGO Touch Panels 600 SL, CODESYS Control for emPC‑A/iMX6 SL, CODESYS Runtime Toolkit, and CODESYS Virtual Control SL. No specific version information was supplied, so all releases of these products are potentially impacted.

Risk and Exploitability

The CVSS score of 7.5 indicates moderate‑to‑high severity. Although the EPSS score is not available, the lack of inclusion in the CISA KEV catalog suggests no known active exploitation, but the remote nature of the attack and the ease of triggering a crash mean that the risk remains significant. An attacker can exploit this vulnerability from any networked device that can reach the audit logger interface, without requiring authentication or privileges.

Generated by OpenCVE AI on March 24, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any available CODESYS Control runtime updates that address the audit log format string vulnerability.
  • If no patch is available, consider disabling or restricting audit logging to reduce exposure to this denial‑of-service surface.
  • Monitor the system for abnormal log activity and address any denial‑of‑service symptoms promptly.

Generated by OpenCVE AI on March 24, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Codesys
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl
Vendors & Products Codesys
Codesys control For Beaglebone Sl
Codesys control For Empc-a/imx6 Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Arm Sl
Codesys control For Linux Sl
Codesys control For Pfc100 Sl
Codesys control For Pfc200 Sl
Codesys control For Plcnext Sl
Codesys control For Raspberry Pi Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys control Rte (sl)
Codesys control Rte \(for Beckhoff Cx\) Sl
Codesys control Win (sl)
Codesys runtime Toolkit
Codesys virtual Control Sl

Tue, 24 Mar 2026 08:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.
Title CODESYS Control Audit Log Format String DoS
Weaknesses CWE-134
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Codesys Control For Beaglebone Sl Control For Empc-a/imx6 Sl Control For Iot2000 Sl Control For Linux Arm Sl Control For Linux Sl Control For Pfc100 Sl Control For Pfc200 Sl Control For Plcnext Sl Control For Raspberry Pi Sl Control For Wago Touch Panels 600 Sl Control Rte (sl) Control Rte \(for Beckhoff Cx\) Sl Control Win (sl) Runtime Toolkit Virtual Control Sl
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-26T12:35:48.666Z

Reserved: 2026-03-04T09:24:19.745Z

Link: CVE-2026-3509

cve-icon Vulnrichment

Updated: 2026-03-26T12:35:44.638Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T08:16:01.657

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-3509

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:39:47Z

Weaknesses