Description
An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.
References (1)
Core 1
Core References
Various Sources
https://certvde.com/de/advisories/VDE-2025-099
Scores
CVSS v3
5.9
EPSS
0.0009
EPSS Percentile
24.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (16)
CODESYS/CODESYS Control for BeagleBone SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for emPC-A/iMX6 SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for IOT2000 SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for Linux ARM SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for Linux SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for PFC100 SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for PFC200 SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for PLCnext SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for Raspberry Pi SL
4.15.0.0 - 4.19.0.0
CODESYS/CODESYS Control for WAGO Touch Panels 600 SL
4.15.0.0 - 4.19.0.0
... and 6 more
Published
Dec 01, 2025
Tracked Since
Feb 18, 2026