Codesys Control V3 Runtime System Toolkit
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Codesys Control V3 Runtime System Toolkit.
By the Year
In 2026 there have been 0 vulnerabilities in Codesys Control V3 Runtime System Toolkit. Control V3 Runtime System Toolkit did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 8.80 |
| 2022 | 1 | 7.80 |
It may take a day or so for new Control V3 Runtime System Toolkit vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Codesys Control V3 Runtime System Toolkit Security Vulnerabilities
CODESYS Runtime Path Traversal Enables File Access & DoS
CVE-2018-25048
8.8 - High
- March 23, 2023
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Directory traversal
CODESYS V3 3.5.16.0 CmpUserMgr Weak Hash Exploit
CVE-2020-12069
7.8 - High
- December 26, 2022
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Use of Password Hash With Insufficient Computational Effort
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Codesys Control V3 Runtime System Toolkit or by Codesys? Click the Watch button to subscribe.