Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-012 |
|
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys
Codesys codesys Installer |
|
| Vendors & Products |
Codesys
Codesys codesys Installer |
Tue, 10 Mar 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer. | |
| Title | CODESYS Installer TOCTOU Privilege Escalation | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-10T16:51:59.328Z
Reserved: 2026-02-11T18:46:15.172Z
Link: CVE-2026-2364
Updated: 2026-03-10T15:39:50.280Z
Status : Awaiting Analysis
Published: 2026-03-10T17:39:29.587
Modified: 2026-03-11T13:53:47.157
Link: CVE-2026-2364
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:00:11Z