An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.
Subscriptions
| Vendors | Products |
|---|---|
|
Codesys
Subscribe
|
Control For Beaglebone Sl
Subscribe
Control For Empc-a/imx6 Sl
Subscribe
Control For Iot2000 Sl
Subscribe
Control For Linux Arm Sl
Subscribe
Control For Linux Sl
Subscribe
Control For Pfc100 Sl
Subscribe
Control For Pfc200 Sl
Subscribe
Control For Plcnext Sl
Subscribe
Control For Raspberry Pi Sl
Subscribe
Control For Wago Touch Panels 600 Sl
Subscribe
Control Rte (sl)
Subscribe
Control Rte \(for Beckhoff Cx\) Sl
Subscribe
Control Win (sl)
Subscribe
Runtime Toolkit
Subscribe
Virtual Control Sl
Subscribe
|
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-018 |
|
History
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte (sl) Codesys control Rte \(for Beckhoff Cx\) Sl Codesys control Win (sl) Codesys runtime Toolkit Codesys virtual Control Sl |
|
| Vendors & Products |
Codesys
Codesys control For Beaglebone Sl Codesys control For Empc-a/imx6 Sl Codesys control For Iot2000 Sl Codesys control For Linux Arm Sl Codesys control For Linux Sl Codesys control For Pfc100 Sl Codesys control For Pfc200 Sl Codesys control For Plcnext Sl Codesys control For Raspberry Pi Sl Codesys control For Wago Touch Panels 600 Sl Codesys control Rte (sl) Codesys control Rte \(for Beckhoff Cx\) Sl Codesys control Win (sl) Codesys runtime Toolkit Codesys virtual Control Sl |
Tue, 24 Mar 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition. | |
| Title | CODESYS Control Audit Log Format String DoS | |
| Weaknesses | CWE-134 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-24T07:42:33.820Z
Reserved: 2026-03-04T09:24:19.745Z
Link: CVE-2026-3509
No data.
Status : Awaiting Analysis
Published: 2026-03-24T08:16:01.657
Modified: 2026-03-24T15:53:48.067
Link: CVE-2026-3509
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:48:52Z
Weaknesses