<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3509 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3509/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3509/feed.xml" rel="self" type="application/rss+xml"/><item><title>CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)</title><link>https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</guid><description>An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.</description><content:encoded>&lt;p>CVE-2026-3509 describes a format string vulnerability within the Audit Log of the CODESYS Control runtime system. This vulnerability allows an unauthenticated remote attacker to influence the format string of messages processed by the affected system. Successful exploitation of this vulnerability results in a denial-of-service (DoS) condition, impacting the availability of the CODESYS Control runtime system. The vulnerability was reported on March 24, 2026. CODESYS is a popular development…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>codesys</category><category>dos</category><category>cve-2026-3509</category><category>ics</category><category>ot</category></item></channel></rss>