Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41660: CWE-669 Incorrect Resource Transfer Between Spheres in CODESYS CODESYS Control RTE (SL)

0
High
VulnerabilityCVE-2025-41660cvecve-2025-41660cwe-669
Published: Tue Mar 24 2026 (03/24/2026, 07:41:43 UTC)
Source: CVE Database V5
Vendor/Project: CODESYS
Product: CODESYS Control RTE (SL)

Description

CVE-2025-41660 is a high-severity vulnerability in CODESYS Control RTE (SL) that allows a low-privileged remote attacker to replace the boot application of the runtime system, leading to unauthorized code execution. The vulnerability stems from incorrect resource transfer between security spheres (CWE-669), enabling privilege escalation without user interaction. Exploitation requires network access and low privileges but no user interaction, making it relatively easy to exploit remotely. The impact includes full compromise of affected industrial control systems, risking confidentiality, integrity, and availability. No known exploits are currently in the wild, and no patches have been released yet. Organizations using CODESYS Control RTE in industrial automation environments should prioritize monitoring and network segmentation to mitigate risk. Countries with significant industrial automation sectors and critical infrastructure using CODESYS products are most at risk. Given the critical nature of industrial control systems, this vulnerability demands urgent attention to prevent potential sabotage or espionage activities.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 08:16:23 UTC

Technical Analysis

CVE-2025-41660 is a vulnerability identified in the CODESYS Control Runtime Environment (RTE) for SL devices, a widely used industrial automation runtime system. The flaw is categorized under CWE-669, which involves incorrect resource transfer between security spheres, indicating a failure in properly isolating or managing resources between different privilege levels or security domains. Specifically, this vulnerability allows a remote attacker with low privileges to replace the boot application of the CODESYS Control runtime system. The boot application is critical as it initializes the runtime environment; replacing it effectively enables the attacker to execute arbitrary code with elevated privileges during system startup. The CVSS v3.1 score of 8.8 reflects the high severity, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the exploit affects the vulnerable component only. This vulnerability could be exploited remotely without user interaction, making it a significant risk for industrial control systems relying on CODESYS Control RTE. No patches or known exploits are currently available, but the potential for severe disruption or unauthorized control of industrial processes is substantial.

Potential Impact

The impact of CVE-2025-41660 is severe for organizations utilizing CODESYS Control RTE in their industrial automation and control systems. Successful exploitation allows attackers to gain unauthorized code execution at a highly privileged level by replacing the boot application, potentially leading to full system compromise. This can result in manipulation or sabotage of industrial processes, data theft, disruption of critical infrastructure, and safety hazards. The confidentiality of sensitive operational data can be breached, the integrity of control logic and system configurations can be compromised, and availability of industrial processes can be disrupted, causing operational downtime and financial losses. Given the critical role of CODESYS in many industrial environments worldwide, this vulnerability could be leveraged for targeted attacks against manufacturing plants, energy grids, water treatment facilities, and other critical infrastructure sectors, amplifying geopolitical risks and industrial espionage threats.

Mitigation Recommendations

To mitigate CVE-2025-41660, organizations should implement the following specific measures: 1) Immediately isolate CODESYS Control RTE devices from untrusted networks using network segmentation and strict firewall rules to limit remote access. 2) Employ robust network monitoring and intrusion detection systems focused on unusual activities targeting CODESYS runtime environments, especially attempts to modify boot applications. 3) Enforce strict access controls and authentication mechanisms to restrict low-privileged user capabilities and prevent unauthorized changes to runtime components. 4) Regularly audit and verify the integrity of boot applications and runtime files using cryptographic hashes or secure boot mechanisms where available. 5) Engage with CODESYS vendors and subscribe to security advisories to obtain patches or updates as soon as they are released. 6) Develop and test incident response plans specific to industrial control system compromises to minimize downtime and damage. 7) Consider deploying application whitelisting and runtime application self-protection (RASP) solutions tailored for industrial control systems to detect and block unauthorized code execution attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.307Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c244c0f4197a8e3b01d2d8

Added to database: 3/24/2026, 8:01:04 AM

Last enriched: 3/24/2026, 8:16:23 AM

Last updated: 3/24/2026, 9:24:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses