PatchSiren cyber security CVE debrief
CVE-2022-4048 CODESYS CVE debrief
CVE-2022-4048 is a high-severity local attack against CODESYS Development System V3 versions prior to 3.5.18.40. In affected Festo Automation Suite deployments that bundled vulnerable CODESYS components, an unauthenticated local attacker could access and manipulate encrypted boot application code.
- Vendor
- CODESYS
- Product
- FESTO
- CVSS
- HIGH 7.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-26
- Original CVE updated
- 2026-03-17
- Advisory published
- 2026-02-26
- Advisory updated
- 2026-03-17
Who should care
OT/ICS teams, Festo Automation Suite users, CODESYS integrators, and administrators of engineering workstations or hosts where local access is possible.
Technical summary
The advisory describes inadequate encryption strength in CODESYS Development System V3 prior to 3.5.18.40. The CVSS 3.1 vector is AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, indicating local exploitation with no privileges or user interaction, and strong confidentiality and integrity impact. CISA’s source item ties the issue to Festo Automation Suite deployments and states that, starting with Festo Automation Suite 2.8.0.138, CODESYS is no longer bundled and must be obtained separately from the official CODESYS website.
Defensive priority
High for OT environments with local engineering-workstation access.
Recommended defensive actions
- Inventory Festo Automation Suite installations and verify whether any deployment includes CODESYS Development System versions prior to 3.5.18.40.
- Upgrade CODESYS to the latest patched version from the official CODESYS website.
- Update Festo Automation Suite to version 2.8.0.138 or later, and keep the Festo Automation Suite connector current.
- Limit and monitor local access to engineering workstations and systems that can modify boot application code.
- Track vendor advisories from CODESYS, Festo, CertVDE, and CISA for follow-on updates or clarified affected versions.
Evidence notes
This debrief is based on the supplied CISA CSAF source item (ICSA-26-076-01) and the linked official references. The vulnerable component is explicitly named as CODESYS Development System V3 prior to 3.5.18.40. The supplied vendor metadata is low-confidence and should be treated as needing review because the advisory content centers on Festo Automation Suite bundling CODESYS components rather than a standalone FESTO product claim.
Official resources
-
CVE-2022-4048 CVE record
CVE.org
-
CVE-2022-4048 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Initial CISA publication: 2026-02-26T08:00:00Z; CISA republication/update: 2026-03-17T06:00:00Z.