CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “codesys”

112 vulnerabilities found for “codesys”

Page 1 of 6

CVE-2018-25048
HIGH8.8

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

codesys / control_for_beaglebone+15
Network
Published Mar 23, 2023
Page 1 of 6
CVE-2020-12069
HIGH7.8

In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.

pilz / pmc+66
Local
Published Dec 26, 2022
CVE-2022-22513
MEDIUM6.5

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.

codesys / control_for_beaglebone_sl+20
Network
Published Apr 7, 2022
CVE-2022-22518
MEDIUM6.5

A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy.

codesys / control_for_beaglebone_sl+9
Network
Published Apr 7, 2022
CVE-2022-22514
HIGH7.1

An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.

codesys / control_for_beaglebone_sl+20
Network
Published Apr 7, 2022
CVE-2022-22517
HIGH7.5

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

codesys / control_for_beaglebone_sl+20
Network
Published Apr 7, 2022
CVE-2022-22519
HIGH7.5

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

codesys / control_for_beaglebone_sl+17
Network
Published Apr 7, 2022
CVE-2022-22515
HIGH8.1

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

codesys / control_for_beaglebone_sl+17
Network
Published Apr 7, 2022
CVE-2021-29242
HIGH7.3

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

codesys / control_for_beaglebone_sl+23
Network
Published May 3, 2021
CVE-2021-29241
HIGH7.5

CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).

codesys / control_for_beaglebone_sl+11
Network
Published May 3, 2021
CVE-2020-15806
HIGH7.5

CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.

codesys / control_for_beaglebone+16
Network
Published Jul 22, 2020
CVE-2020-12068
MEDIUM6.5

An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.

codesys / control_for_beaglebone+11
Network
Published May 14, 2020
CVE-2020-10245
CRITICAL9.8

CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.

codesys / control_for_beaglebone+14
Network
Published Mar 26, 2020
CVE-2020-7052
MEDIUM6.5

CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.

codesys / control_for_beaglebone+15
Network
Published Jan 24, 2020
CVE-2019-18858
CRITICAL9.8

CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.

codesys / control_for_beaglebone+13
Network
Published Nov 20, 2019
CVE-2019-13542
MEDIUM6.5

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.

codesys / control_for_beaglebone+9
Network
Published Sep 17, 2019
CVE-2019-9009
HIGH7.5

An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.

codesys / control_for_beaglebone+13
Network
Published Sep 17, 2019
CVE-2019-9008
HIGH8.8

An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.

codesys / control_for_beaglebone+9
Network
Published Sep 17, 2019
CVE-2019-13548
CRITICAL9.8

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

codesys / control_for_beaglebone+15
Network
Published Sep 13, 2019
CVE-2019-13532
HIGH7.5

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.

codesys / control_for_beaglebone+15
Network
Published Sep 13, 2019