CVE-2026-3509

Severity
7.5HIGH
EPSS
0.1%
top 71.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages15 packages

CVEListV5codesys/codesys_control_rte_(sl)3.5.17.03.5.22.0
CVEListV5codesys/codesys_control_win_(sl)3.5.17.03.5.22.0
CVEListV5codesys/codesys_virtual_control_sl4.1.0.04.21.0.0
CVEListV5codesys/codesys_control_for_linux_sl4.1.0.04.21.0.0
CVEListV5codesys/codesys_control_for_pfc100_sl4.1.0.04.21.0.0

🔴Vulnerability Details

2
CVEList
CODESYS Control Audit Log Format String DoS2026-03-24
GHSA
GHSA-34rr-qp2j-p4q7: An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime syst2026-03-24
CVE-2026-3509 (HIGH CVSS 7.5) | An unauthenticated remote attacker | cvebase.io