<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Codesys — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/codesys/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/codesys/feed.xml" rel="self" type="application/rss+xml"/><item><title>CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)</title><link>https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</guid><description>An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.</description><content:encoded>&lt;p>CVE-2026-3509 describes a format string vulnerability within the Audit Log of the CODESYS Control runtime system. This vulnerability allows an unauthenticated remote attacker to influence the format string of messages processed by the affected system. Successful exploitation of this vulnerability results in a denial-of-service (DoS) condition, impacting the availability of the CODESYS Control runtime system. The vulnerability was reported on March 24, 2026. CODESYS is a popular development…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>codesys</category><category>dos</category><category>cve-2026-3509</category><category>ics</category><category>ot</category></item><item><title>CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-03-codesys-vulns/</link><pubDate>Wed, 25 Mar 2026 09:46:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-codesys-vulns/</guid><description>Multiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in CODESYS, a software platform widely used for industrial automation. These vulnerabilities, if exploited, could allow a remote attacker to execute arbitrary program code on affected systems and/or cause a denial-of-service (DoS) condition. Given the prevalence of CODESYS in critical infrastructure and manufacturing environments, these vulnerabilities pose a significant risk. Public details are limited, but the potential impact necessitates immediate action from defenders to identify and mitigate potentially vulnerable CODESYS installations. Successful exploitation can lead to significant disruption of industrial processes, data manipulation, and potentially physical damage depending on the affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable CODESYS installation accessible over the network (e.g., via Shodan or similar).</li>
<li>Attacker crafts a malicious request specifically targeting one of the CODESYS vulnerabilities. Due to lack of specifics, this step is generic. Example attack vectors could include crafted network packets or malicious project files.</li>
<li>The malicious request is sent to the vulnerable CODESYS service.</li>
<li>The CODESYS service improperly processes the request due to the vulnerability.</li>
<li>This improper processing leads to arbitrary code execution within the context of the CODESYS service.</li>
<li>The attacker executes malicious code to gain control of the CODESYS runtime. This code could install a backdoor, modify control logic, or exfiltrate data.</li>
<li>Alternatively, the malformed request triggers a denial-of-service condition, causing the CODESYS service or the entire system to crash.</li>
<li>The attacker disrupts industrial processes or gains unauthorized access to the industrial control system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these CODESYS vulnerabilities can have severe consequences, including unauthorized access to industrial control systems, disruption of critical infrastructure, data manipulation, and potentially physical damage. The number of affected systems is potentially large, given the widespread use of CODESYS in various sectors including manufacturing, energy, and transportation. A successful attack could lead to significant financial losses, reputational damage, and even safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious activity targeting CODESYS services. Use the network connection rule below to detect unusual processes connecting to CODESYS ports.</li>
<li>Implement strict network segmentation to limit the exposure of CODESYS installations to external networks.</li>
<li>Since specific CVEs are not available, regularly check the CODESYS website for security updates and apply them immediately.</li>
<li>Investigate any crashes or unexpected behavior of CODESYS services, using process creation logs with the process creation rule below to see if the crash was caused by a malicious process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>codesys</category><category>vulnerability</category><category>arbitrary-code-execution</category><category>denial-of-service</category><category>ics</category></item></channel></rss>