EUVD-2026-14784

| CVE-2026-3509 HIGH
2026-03-24 CERTVDE GHSA-34rr-qp2j-p4q7
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 24, 2026 - 08:00 vuln.today
EUVD ID Assigned
Mar 24, 2026 - 08:00 euvd
EUVD-2026-14784
CVE Published
Mar 24, 2026 - 07:42 nvd
HIGH 7.5

Description

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

Analysis

A format string vulnerability exists in the Audit Log component of CODESYS Control runtime system that allows unauthenticated remote attackers to inject malicious format specifiers into log messages. This affects numerous CODESYS Control products across multiple platforms including Windows, Linux, embedded systems (BeagleBone, Raspberry Pi, PFC100/200), and industrial controllers (Beckhoff CX, WAGO Touch Panels). …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all CODESYS Control installations in your environment and assess network exposure; isolate critical systems from untrusted networks where possible. Within 7 days: Implement network segmentation and access controls to restrict connections to CODESYS systems; deploy WAF rules to filter malicious format string payloads if systems are internet-facing. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2026-14784 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy