CVE-2025-41660 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 24, 2026
CODESYS Control - Authentication Bypass
Overview
CODESYS Control runtime system contains a code execution vulnerability caused by insufficient protection of the boot application, letting low-privileged remote attackers execute unauthorized code.
Severity & Score
Impact
Low-privileged remote attackers can execute unauthorized code, potentially compromising the entire system.
Mitigation
Update to the latest version of CODESYS Control runtime system.
Social Media Activity(1 post)
#OT #Advisory VDE-2026-011 CODESYS Control V3 - Untrusted boot application The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application. #CVE CVE-2025-41660 https://certvde.com/en/advisories/vde-2026-011/ #CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-02_vde-2026-011.json
View original postRelated Resources
Details
- CVE ID
- CVE-2025-41660
- Severity
- High
- CVSS Score
- 8.8
- Type
- undefined
- Status
- unconfirmed
- EPSS
- 20.8%
- Social Posts
- 1
CWE
- CWE-669
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H