Control V3 Runtime System Toolkit Codesys Control V3 Runtime System Toolkit

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Codesys Control V3 Runtime System Toolkit.

By the Year

In 2026 there have been 0 vulnerabilities in Codesys Control V3 Runtime System Toolkit. Control V3 Runtime System Toolkit did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 1 8.80
2022 1 7.80

It may take a day or so for new Control V3 Runtime System Toolkit vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Codesys Control V3 Runtime System Toolkit Security Vulnerabilities

CODESYS Runtime Path Traversal Enables File Access & DoS
CVE-2018-25048 8.8 - High - March 23, 2023

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

Directory traversal

CODESYS V3 3.5.16.0 CmpUserMgr Weak Hash Exploit
CVE-2020-12069 7.8 - High - December 26, 2022

In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.

Use of Password Hash With Insufficient Computational Effort

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Codesys Control V3 Runtime System Toolkit or by Codesys? Click the Watch button to subscribe.

Codesys
Vendor

subscribe