Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CODESYS — Vulnerabilities & Security Advisories 95

Browse all 95 CVE security advisories affecting CODESYS. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CODESYS serves as a widely adopted software development environment for industrial automation, enabling the creation of control applications for programmable logic controllers (PLCs). Its extensive use in critical infrastructure has made it a significant target for cyberattacks, resulting in 94 recorded Common Vulnerabilities and Exposures. Historically, the platform has been susceptible to remote code execution, buffer overflows, and privilege escalation flaws, often stemming from insecure default configurations or unpatched legacy components. Notable incidents include the exploitation of the CODESYS Control Win32 service, which allowed attackers to execute arbitrary commands with system-level privileges. These vulnerabilities highlight the risks associated with embedded industrial software, particularly when deployed without rigorous security hardening. The high volume of CVEs underscores the necessity for continuous patch management and secure coding practices within the industrial IoT ecosystem to mitigate potential operational disruptions.

Found 27 results / 95Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2026-3509 CODESYS Control Audit Log Format String DoS — CODESYS Control RTE (SL)CWE-134 7.5 High2026-03-24
CVE-2025-41660 CODESYS Control Boot Application Replacement Enables Code Execution — CODESYS Control RTE (SL)CWE-669 8.8 High2026-03-24
CVE-2025-41738 CODESYS Control - Invalid type usage in visualization — CODESYS Control RTE (SL)CWE-843 7.5 High2025-12-01
CVE-2022-47393 CODESYS: Multiple products prone to improperly restricted memory operations — CODESYS Control RTE (SL)CWE-119 6.5 Medium2023-05-15
CVE-2022-47392 CODESYS: Multiple products prone to Improper Input Validation — CODESYS Control RTE (SL)CWE-20 6.5 Medium2023-05-15
CVE-2022-47391 CODESYS: Multiple products prone to Improper Input Validation — CODESYS Control RTE (SL)CWE-20 7.5 High2023-05-15
CVE-2022-47390 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47389 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47388 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47387 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47386 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47385 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47384 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47383 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47382 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47381 CODESYS: Multiple products prone to stack based out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47380 CODESYS: Multiple products prone to out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47379 CODESYS: Multiple products prone to out-of-bounds write — CODESYS Control RTE (SL)CWE-787 8.8 High2023-05-15
CVE-2022-47378 CODESYS: Multiple products prone to Improper Input Validation — CODESYS Control RTE (SL)CWE-20 6.5 Medium2023-05-15
CVE-2022-30792 CODESYS: CmpChannelServer, CmpChannelServerEmbedded allow unauthenticated attackers to block all their available communication channels — CODESYS Control RTE (SL)CWE-400 7.5 High2022-07-11
CVE-2022-30791 CODESYS V3: CmpBlkDrvTcp allows unauthenticated attackers to block all its available TCP connections — CODESYS Control RTE (SL)CWE-400 7.5 High2022-07-11
CVE-2022-22519 Special HTTP(s) Requests can cause a buffer-read causing a crash of the webserver and the runtime system. — CODESYS Control RTE (SL)CWE-126 7.5 High2022-04-07
CVE-2022-22517 Communication Components in multiple CODESYS products vulnerable to communication channel disruption — CODESYS Control RTE (SL)CWE-334 7.5 High2022-04-07
CVE-2022-22516 CODESYS driver SysDrv3S allows SYSTEM users on Microsoft Windows to read and write in restricted memory space. — CODESYS Control RTE (SL)CWE-732 7.8 High2022-04-07
CVE-2022-22515 A component of the CODESYS Control runtime system allows read and write access to configuration files — CODESYS Control RTE (SL)CWE-668 8.1 High2022-04-07
CVE-2022-22514 Untrusted Pointer Dereference in multiple CODESYS products can lead to a DoS. — CODESYS Control RTE (SL)CWE-822 7.1 High2022-04-07
CVE-2022-22513 Null Pointer Dereference in multiple CODESYS products can lead to a DoS. — CODESYS Control RTE (SL)CWE-476 6.5 Medium2022-04-07

This page lists every published CVE security advisory associated with CODESYS. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.