PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-10612 3S-Smart CVE debrief

CISA's ICSA-26-076-01, published 2026-02-26 and revised 2026-03-17, covers CVE-2018-10612 in CODESYS Control V3 products prior to 3.5.14.0. Because user access management and communication encryption are not enabled by default, an attacker may gain access to the device and sensitive information, including user credentials. Systems using Festo Automation Suite bundles should move to patched CODESYS/Festo releases and confirm the vulnerable component is no longer present.

Vendor
3S-Smart
Product
FESTO
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-09-30
Original CVE updated
2025-11-13
Advisory published
2025-09-30
Advisory updated
2025-11-13

Who should care

OT/ICS teams, system integrators, and engineers running Festo Automation Suite installations that include CODESYS components, especially where CODESYS Control V3 devices may be reachable from the network.

Technical summary

The advisory describes a default security configuration problem in CODESYS Control V3 prior to version 3.5.14.0: user access management and communication encryption are not enabled by default. CISA maps the issue to CWE-284 and rates it CVSS 3.1 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating that remote attackers could access the device and sensitive data, including credentials, without authentication.

Defensive priority

Urgent: treat as a critical OT exposure and prioritize patching, component verification, and exposure review immediately.

Recommended defensive actions

  • Identify Festo Automation Suite installations that bundle CODESYS components and confirm whether they are below version 2.8.0.138.
  • Upgrade to the latest patched CODESYS release from the official CODESYS website, following the vendor's installation and update instructions.
  • Update Festo Automation Suite to the latest available release and keep the FAS connector current.
  • Verify that CODESYS Control V3 instances are at or above version 3.5.14.0 or otherwise no longer rely on the vulnerable default configuration.
  • Monitor official CODESYS and Festo advisories for follow-on fixes and apply updates promptly.

Evidence notes

The source advisory title is 'CODESYS in Festo Automation Suite.' Its description states that CODESYS Control V3 products prior to 3.5.14.0 do not enable user access management or communication encryption by default, which can expose devices and credentials. The advisory metadata also lists affected Festo Automation Suite versions and shows publication on 2026-02-26 with a republication/revision on 2026-03-17.

Official resources

Publicly disclosed in the CISA CSAF advisory on 2026-02-26 and revised on 2026-03-17; no Known Exploited Vulnerabilities (KEV) entry is provided in the supplied corpus.