Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3509: CWE-134 Use of Externally-Controlled Format String in CODESYS CODESYS Control RTE (SL)

0
High
VulnerabilityCVE-2026-3509cvecve-2026-3509cwe-134
Published: Tue Mar 24 2026 (03/24/2026, 07:42:33 UTC)
Source: CVE Database V5
Vendor/Project: CODESYS
Product: CODESYS Control RTE (SL)

Description

CVE-2026-3509 is a high-severity vulnerability in CODESYS Control RTE (SL) version 3. 5. 17. 0 that allows an unauthenticated remote attacker to manipulate the format string used by the Audit Log. This externally-controlled format string vulnerability (CWE-134) can lead to denial-of-service (DoS) conditions by causing the runtime system to crash or become unresponsive. The vulnerability does not impact confidentiality or integrity but directly affects availability. Exploitation requires no authentication or user interaction and can be performed remotely over the network. There are currently no known exploits in the wild, and no patches have been published yet. Organizations using the affected CODESYS Control runtime should prioritize mitigation to prevent potential service disruptions. This threat is particularly relevant to industrial control systems and automation environments where CODESYS is widely deployed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 08:16:07 UTC

Technical Analysis

CVE-2026-3509 is a vulnerability identified in the CODESYS Control RTE (SL) runtime system, specifically version 3.5.17.0. The flaw is classified under CWE-134, which involves the use of externally-controlled format strings. In this case, an unauthenticated remote attacker can manipulate the format string parameters processed by the Audit Log component of the runtime. Format string vulnerabilities occur when user-supplied input is unsafely used as a format string in functions like printf, leading to unexpected behavior such as memory corruption or crashes. Here, the attacker’s control over the format string can cause the runtime system to enter a denial-of-service state by crashing or hanging, thus disrupting the availability of the control system. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity due to its network attack vector, lack of required privileges or user interaction, and its impact on availability. No confidentiality or integrity impact is noted. The vulnerability was published on March 24, 2026, with no known exploits in the wild and no patches currently available. CODESYS Control RTE is widely used in industrial automation and control systems, making this vulnerability a significant concern for critical infrastructure and manufacturing environments. The lack of authentication requirement and remote exploitability increase the risk profile, emphasizing the need for immediate defensive measures.

Potential Impact

The primary impact of CVE-2026-3509 is a denial-of-service condition in industrial control systems running the affected CODESYS Control RTE version. This can lead to operational downtime, disruption of automated processes, and potential safety risks in environments relying on continuous control system availability. Since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a direct concern. However, the loss of availability in critical infrastructure such as manufacturing plants, energy grids, or transportation systems can have cascading effects, including financial losses, safety incidents, and reputational damage. The ease of exploitation—requiring no authentication or user interaction—means attackers can potentially launch attacks remotely with minimal effort. Organizations with large deployments of CODESYS Control RTE are at risk of widespread disruption if this vulnerability is exploited at scale. The absence of patches increases the window of exposure, necessitating proactive mitigation to maintain operational continuity.

Mitigation Recommendations

1. Network Segmentation: Isolate CODESYS Control RTE systems from general IT networks and restrict access to trusted management networks only. 2. Access Controls: Implement strict firewall rules and access control lists (ACLs) to limit inbound connections to the runtime system, allowing only authorized IP addresses and protocols. 3. Input Validation and Monitoring: Although the vulnerability is in the runtime, monitor audit log inputs and network traffic for anomalous or suspicious format string patterns that could indicate exploitation attempts. 4. Intrusion Detection/Prevention Systems (IDS/IPS): Deploy IDS/IPS solutions with signatures or heuristics to detect attempts to exploit format string vulnerabilities targeting CODESYS systems. 5. Vendor Coordination: Engage with CODESYS vendor support to obtain patches or workarounds as soon as they become available and apply them promptly. 6. Incident Response Preparedness: Develop and test incident response plans specific to industrial control system DoS scenarios to minimize downtime and recovery time. 7. System Hardening: Disable or restrict audit log features if feasible, or configure logging to minimize exposure to externally-controlled inputs until a patch is released. 8. Regular Updates: Maintain up-to-date inventories of affected systems and monitor security advisories for new developments related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-03-04T09:24:19.745Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c244c0f4197a8e3b01d2db

Added to database: 3/24/2026, 8:01:04 AM

Last enriched: 3/24/2026, 8:16:07 AM

Last updated: 3/24/2026, 9:20:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses