Codesys

Control For Iot2000 Sl

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 24.03.2026 07:42:33
  • Zuletzt bearbeitet 24.03.2026 15:53:48

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

Medienbericht
  • EPSS 0.27%
  • Veröffentlicht 24.03.2026 07:41:43
  • Zuletzt bearbeitet 24.03.2026 15:53:48

A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

  • EPSS 0.11%
  • Veröffentlicht 01.12.2025 10:02:33
  • Zuletzt bearbeitet 23.02.2026 15:42:30

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

  • EPSS 0.1%
  • Veröffentlicht 01.12.2025 10:00:44
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially caus...

  • EPSS 0.15%
  • Veröffentlicht 04.08.2025 08:15:48
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 04.08.2025 08:15:48
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all servic...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 04.08.2025 08:15:47
  • Zuletzt bearbeitet 15.04.2026 00:35:42

CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.

  • EPSS 0.17%
  • Veröffentlicht 18.03.2025 11:15:39
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.

  • EPSS 0.89%
  • Veröffentlicht 25.09.2024 08:15:04
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.

  • EPSS 1.18%
  • Veröffentlicht 04.06.2024 09:15:09
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.