CODESYS Control V3 - Externally-controlled format string in Auditlog
A format string vulnerability in CODESYS Control's CmpAuditLog component allows unauthenticated remote attackers to crash the runtime. The vulnerability is triggered when malicious format strings are sent to the Audit Log system, which processes them without proper validation. The impact is limited to a denial of service (runtime crash). Multiple CODESYS product variants are affected, including Control RTE for standard and Beckhoff platforms, Control Win, Runtime Toolkit, and embedded variants for BeagleBone, Linux, PLCnext, WAGO, and other industrial platforms.
- Network access to the CODESYS Control runtime (typically port 11740 or runtime-configured port)
- Audit Log feature must be enabled in the runtime (default configuration)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8f317b2b-a6ef-4942-8908-15c600fdc936Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.