OTPulse

CODESYS in Festo Automation Suite

Act Now9.8ICS-CERT ICSA-26-076-01Mar 17, 2026
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple critical vulnerabilities exist in CODESYS Development System bundled with Festo Automation Suite. The vulnerabilities span memory corruption, insecure deserialization, improper access controls, cryptographic weaknesses, and other flaws that allow an unauthenticated attacker with network access to execute arbitrary code. Affected versions are CODESYS Development System 3.0 and 3.5.16.10 bundled in Festo Automation Suite versions prior to 2.8.0.138. Starting with Festo Automation Suite 2.8.0.138, CODESYS is no longer bundled and must be installed separately.

What this means
What could happen
Multiple critical vulnerabilities in CODESYS allow an attacker with network access to execute arbitrary code on engineering workstations and potentially control systems. This could allow modification of PLC programs, alteration of process setpoints, or stopping production equipment.
Who's at risk
Manufacturing facilities using Festo Automation Suite with bundled CODESYS Development System versions prior to 2.8.0.138 are affected. Engineering teams who develop and deploy PLC programs using CODESYS are directly at risk. Any organization with CODESYS-based automation systems running on networked workstations should assess exposure.
How it could be exploited
An attacker on the network can send a malicious network request to a CODESYS Development System instance without authentication. The vulnerability allows code execution in the context of the workstation running CODESYS, which typically has access to connected PLCs and control devices.
Prerequisites
  • Network access to the CODESYS Development System port (typically 11740 or configured port)
  • No credentials required
  • CODESYS Development System running and accessible from attacker's network
Remotely exploitable without authenticationLow attack complexityActively exploited (KEV)High EPSS score (36.9%)Affects engineering workstations that control production systemsDefault network accessibility of CODESYS ports
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (4)
4 EOL
ProductAffected VersionsFix Status
CODESYS Development System 3.0< 2.8.0.138No fix (EOL)
CODESYS Development System 3.02.8.0.137No fix (EOL)
CODESYS Development System 3.5.16.10< 2.8.0.138No fix (EOL)
CODESYS Development System 3.5.16.102.8.0.137No fix (EOL)
Remediation & Mitigation
0/6
Do now
0/3
HOTFIXUpdate Festo Automation Suite to version 2.8.0.138 or later and ensure CODESYS Development System 3.5.21.20 or later is installed as the external component
HOTFIXDownload and install the latest patched CODESYS version directly from the official CODESYS website if not bundled with Festo Automation Suite
WORKAROUNDImplement firewall rules to prevent network access to CODESYS Development System ports from untrusted networks
Mitigations - no patch available
0/3
The following products have reached End of Life with no planned fix: CODESYS Development System 3.0, CODESYS Development System 3.0, CODESYS Development System 3.5.16.10, CODESYS Development System 3.5.16.10. Apply the following compensating controls:
HARDENINGIsolate engineering workstations running CODESYS to a separate, protected network segment with restricted access from business networks
HARDENINGIf remote access to CODESYS is required, use a VPN with multi-factor authentication and keep VPN software updated
HARDENINGEstablish a process to monitor and apply CODESYS security advisories promptly when released
CVEs (126)
CVE-2010-5250CVE-2017-3735CVE-2018-0739CVE-2018-20025CVE-2019-13532CVE-2019-13542CVE-2019-18858CVE-2019-5105CVE-2019-9008CVE-2019-9010CVE-2019-9012CVE-2020-10245CVE-2020-12068CVE-2020-14509CVE-2020-14513CVE-2020-14517CVE-2020-15806CVE-2020-7052CVE-2021-21864CVE-2021-21866CVE-2021-21867CVE-2021-21869CVE-2021-29240CVE-2021-29242CVE-2021-30187CVE-2021-30190CVE-2021-30195CVE-2021-33486CVE-2021-34595CVE-2021-36763CVE-2021-36765CVE-2022-1989CVE-2022-22508CVE-2022-22514CVE-2022-22516CVE-2022-22519CVE-2022-30792CVE-2022-31806CVE-2022-32136CVE-2022-32138CVE-2022-32140CVE-2022-32142CVE-2022-32143CVE-2022-4048CVE-2022-47378CVE-2022-47380CVE-2022-47384CVE-2022-47385CVE-2022-47386CVE-2022-47387CVE-2022-47388CVE-2022-47389CVE-2022-47390CVE-2022-47391CVE-2022-47392CVE-2022-47393CVE-2023-3662CVE-2023-3663CVE-2023-3669CVE-2023-3670CVE-2023-37545CVE-2023-37546CVE-2023-37547CVE-2023-37548CVE-2023-37549CVE-2023-37550CVE-2023-37551CVE-2023-37552CVE-2023-37553CVE-2023-37554CVE-2023-37555CVE-2023-37556CVE-2023-37557CVE-2023-37558CVE-2023-37559CVE-2023-3935CVE-2023-49675CVE-2023-49676CVE-2023-6357CVE-2024-5000CVE-2024-8175CVE-2025-0694CVE-2025-1468CVE-2025-41658CVE-2025-41659CVE-2020-11023CVE-2022-47382CVE-2025-2595CVE-2018-10612CVE-2018-20026CVE-2019-13538CVE-2019-13548CVE-2019-19789CVE-2019-9009CVE-2019-9011CVE-2019-9013CVE-2020-12067CVE-2020-12069CVE-2020-14515CVE-2020-14519CVE-2020-16233CVE-2021-21863CVE-2021-21865CVE-2021-21868CVE-2021-29239CVE-2021-29241CVE-2021-30186CVE-2021-30188CVE-2021-33485CVE-2021-34593CVE-2021-34596CVE-2021-36764CVE-2022-1965CVE-2022-22513CVE-2022-22515CVE-2022-22517CVE-2022-30791CVE-2022-31805CVE-2022-32137CVE-2022-32139CVE-2022-32141CVE-2022-4046CVE-2022-4224CVE-2022-47379CVE-2022-47381CVE-2022-47383
↑↓ Navigate · Esc Close
API: /api/v1/advisories/1dc1a922-36a6-4606-8383-89dfa897da0d
CODESYS in Festo Automation Suite | CVSS 9.8 - OTPulse