Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2364: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in CODESYS CODESYS Installer

0
High
VulnerabilityCVE-2026-2364cvecve-2026-2364cwe-367
Published: Tue Mar 10 2026 (03/10/2026, 07:22:42 UTC)
Source: CVE Database V5
Vendor/Project: CODESYS
Product: CODESYS Installer

Description

CVE-2026-2364 is a high-severity TOCTOU (Time-of-check to Time-of-use) race condition vulnerability in the CODESYS Installer. It allows a low-privileged local attacker to escalate privileges if a legitimate user initiates or confirms a self-update or installation prompt in the CODESYS Development System. Exploitation requires user interaction and local access but can lead to full confidentiality, integrity, and availability compromise. No known exploits are currently in the wild. The vulnerability affects all versions of the CODESYS Installer as identified. Due to the critical nature of industrial control systems using CODESYS, this vulnerability poses significant risk to organizations relying on this software. Mitigation involves careful privilege management, restricting local access, and monitoring update processes until an official patch is released. Countries with extensive industrial automation sectors using CODESYS are at higher risk. The CVSS score is 7. 3 (high), reflecting the ease of exploitation with user interaction and the potential for severe impact.

AI-Powered Analysis

AILast updated: 03/10/2026, 07:48:44 UTC

Technical Analysis

CVE-2026-2364 is a Time-of-check to Time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, found in the CODESYS Installer component of the CODESYS Development System. The vulnerability arises during the installation or self-update process, where the installer performs security checks (time-of-check) and then uses resources or files (time-of-use) without proper synchronization or validation. This race condition can be exploited by a low-privileged local attacker who waits for a legitimate user to initiate or confirm an installation or update prompt. By exploiting the timing window between the check and use phases, the attacker can manipulate the installer’s behavior to escalate privileges, potentially gaining elevated rights on the system. The vulnerability requires local access and user interaction, as the legitimate user must confirm the update or installation prompt. The CVSS v3.1 base score is 7.3, indicating high severity due to the combination of local attack vector, low complexity, required privileges, user interaction, and the impact on confidentiality, integrity, and availability. No patches or exploits are currently publicly available, but the vulnerability is published and recognized by CERTVDE. Given that CODESYS is widely used in industrial automation and control systems, this vulnerability could have serious implications if exploited in operational environments.

Potential Impact

The exploitation of CVE-2026-2364 can lead to a local privilege escalation, allowing attackers with limited access to gain elevated rights on systems running the CODESYS Installer. This can compromise the confidentiality of sensitive industrial control data, integrity of system configurations and software, and availability of critical automation processes. In industrial environments, such unauthorized privilege escalation can lead to sabotage, unauthorized control, or disruption of manufacturing and control operations. Organizations relying on CODESYS for automation and control are at risk of operational downtime, safety incidents, and potential regulatory non-compliance. The requirement for user interaction and local access limits remote exploitation but does not eliminate risk in environments where multiple users share systems or where attackers have gained initial footholds. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation once proof-of-concept code or weaponized exploits become available.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict local access controls to limit the ability of low-privileged users to interact with systems running the CODESYS Installer. Employ application whitelisting and endpoint protection to monitor and restrict unauthorized modifications to installer files or processes. Educate users to be cautious when confirming update or installation prompts, especially on shared or multi-user systems. Use least privilege principles to minimize the number of users with installation or update rights. Monitor system logs and audit trails for suspicious activity related to installer execution or privilege escalations. Consider isolating critical industrial control systems from general user environments to reduce local attack surfaces. Once patches become available, prioritize timely deployment and verify update integrity. Additionally, vendors and integrators should review installer code for race conditions and implement atomic operations or locking mechanisms to prevent TOCTOU vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-02-11T18:46:15.172Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69afc976ea502d3aa81f019e

Added to database: 3/10/2026, 7:34:14 AM

Last enriched: 3/10/2026, 7:48:44 AM

Last updated: 3/10/2026, 9:49:46 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses