CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

codesys

development_system

41 known vulnerabilities · sorted by CVSS score

CVE-2019-9010
CRITICAL9.8

An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

codesys / control_for_beaglebone_sl+9
Network
Published Aug 15, 2019
Page 1 of 3
CVE-2019-9013
HIGH8.8

An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.

codesys / control_for_beaglebone_sl+11
Adjacent
Published Aug 15, 2019
CVE-2022-4224
HIGH8.8

In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.

codesys / control_for_beaglebone_sl+15
Network
Published Mar 23, 2023
CVE-2023-3663
HIGH8.8

In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.

codesys / development_system
Network
Published Aug 3, 2023
CVE-2022-22515
HIGH8.1

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

codesys / control_for_beaglebone_sl+17
Network
Published Apr 7, 2022
CVE-2021-21865
HIGH7.8

A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

codesys / development_system+1
Local
Published Aug 2, 2021
CVE-2022-22516
HIGH7.8

The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.

codesys / control_rte_sl+3
Local
Published Apr 7, 2022
CVE-2021-21864
HIGH7.8

A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

codesys / development_system+1
Local
Published Aug 2, 2021
CVE-2021-29240
HIGH7.8

The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content.

codesys / development_system
Local
Published May 4, 2021
CVE-2021-21866
HIGH7.8

A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

codesys / development_system+1
Local
Published Aug 2, 2021
CVE-2021-21863
HIGH7.8

A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

codesys / development_system+1
Local
Published Aug 5, 2021
CVE-2021-29239
HIGH7.8

CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity.

codesys / development_system
Local
Published May 3, 2021
CVE-2022-30791
HIGH7.5

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

codesys / control_for_beaglebone+19
Network
Published Jul 11, 2022
CVE-2022-22519
HIGH7.5

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

codesys / control_for_beaglebone_sl+17
Network
Published Apr 7, 2022
CVE-2022-30792
HIGH7.5

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.

codesys / control_for_beaglebone+19
Network
Published Jul 11, 2022
CVE-2022-31805
HIGH7.5

In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.

codesys / development_system+9
Network
Published Jun 24, 2022
CVE-2022-22517
HIGH7.5

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

codesys / control_for_beaglebone_sl+20
Network
Published Apr 7, 2022
CVE-2021-29241
HIGH7.5

CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).

codesys / control_for_beaglebone_sl+11
Network
Published May 3, 2021
CVE-2019-9012
HIGH7.5

An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

codesys / control_for_beaglebone_sl+9
Network
Published Aug 15, 2019
CVE-2018-20025
HIGH7.5

Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.

codesys / control_for_beaglebone_sl+14
Network
Published Feb 19, 2019