CVE-2026-3509
Published: 24 March 2026
Summary
CVE-2026-3509 is a high-severity Use of Externally-Controlled Format String (CWE-134) vulnerability in Certvde (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the format string vulnerability in the CODESYS Audit Log by identifying, reporting, and applying patches to prevent exploitation.
Validates and sanitizes unauthenticated remote inputs to the Audit Log component to block format string manipulation leading to DoS.
Protects against or limits the impact of DoS conditions caused by format string exploits in the Audit Log processing.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network exploitation of the format string flaw in the exposed CODESYS runtime directly enables T1190 (Exploit Public-Facing Application) and produces availability impact via T1499.004 (Application or System Exploitation).
NVD Description
An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.
Deeper analysisAI
CVE-2026-3509 is a format string vulnerability (CWE-134) affecting the Audit Log component of the CODESYS Control runtime system. Published on 2026-03-24, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The issue allows an unauthenticated remote attacker to control the format string of messages processed by the Audit Log.
An unauthenticated attacker with network access to the vulnerable system can exploit this flaw with low complexity and no user interaction required. Successful exploitation results in a denial-of-service (DoS) condition, disrupting the availability of the affected CODESYS Control runtime system.
Mitigation details are provided in the advisory VDE-2026-018 from CERT VDE, available at https://certvde.com/de/advisories/VDE-2026-018.
Details
- CWE(s)