CVE-2025-41660

HIGH

CODESYS Control Boot Application Replacement Enables Code Execution

Title source: cna
STIX 2.1

Description

A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

Scores

CVSS v3 8.8
EPSS 0.0027
EPSS Percentile 50.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-669
Status published
Products (16)
CODESYS/CODESYS Control for BeagleBone SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for emPC-A/iMX6 SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for IOT2000 SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for Linux ARM SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for Linux SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for PFC100 SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for PFC200 SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for PLCnext SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for Raspberry Pi SL 0.0.0 - 4.21.0.0
CODESYS/CODESYS Control for WAGO Touch Panels 600 SL 0.0.0 - 4.21.0.0
... and 6 more
Published Mar 24, 2026
Tracked Since Mar 24, 2026