CVE-2026-2364

7.3 HIGH

📋 TL;DR

A local attacker with low privileges can exploit a TOCTOU (Time-of-Check Time-of-Use) vulnerability in the CODESYS installer to gain elevated system rights. This occurs when legitimate users confirm self-update prompts or initiate installations. Systems running CODESYS Development System are affected.

💻 Affected Systems

Products:
  • CODESYS Development System
Versions: Specific versions not detailed in provided reference; likely multiple versions before patch.
Operating Systems: Windows, Linux (if CODESYS supports it)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access and a legitimate user action (update/install confirmation).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains full SYSTEM/root privileges, enabling complete system compromise, data theft, and persistence.

🟠

Likely Case

Local attacker escalates to administrator privileges, allowing installation of malware, credential theft, and lateral movement.

🟢

If Mitigated

Attack fails due to proper access controls, monitoring, or patched systems.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access.
🏢 Internal Only: HIGH - Internal users with low privileges could exploit this to gain administrative rights on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and timing the attack during user-initiated installer actions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check CODESYS vendor advisory for specific patched versions.

Vendor Advisory: https://certvde.com/de/advisories/VDE-2026-012

Restart Required: Yes

Instructions:

1. Check CODESYS vendor advisory for patched version. 2. Update CODESYS Development System to patched version. 3. Restart system if required.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running CODESYS to trusted personnel only.

Monitor Installer Processes

all

Monitor for suspicious process creation during CODESYS installer execution.

🧯 If You Can't Patch

  • Implement strict least privilege: Ensure no low-privileged users have local access to affected systems.
  • Enable detailed auditing of process creation and privilege escalation events on affected systems.

🔍 How to Verify

Check if Vulnerable:

Check CODESYS version against vendor advisory; if unpatched and local access exists, system is vulnerable.

Check Version:

Check within CODESYS Development System interface or consult vendor documentation.

Verify Fix Applied:

Confirm CODESYS version is updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Suspicious process creation during CODESYS installer execution

Network Indicators:

  • None - this is a local attack

SIEM Query:

Search for Event ID 4688 (Windows) or similar process creation logs with CODESYS installer and unexpected parent/child processes.

🔗 References

📤 Share & Export