PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-2595 CODESYS CVE debrief

CVE-2025-2595 is a network-reachable information disclosure issue in CODESYS Visualization as used with Festo Automation Suite. A remote, unauthenticated attacker can bypass user management through forced browsing and read visualization template files or static elements. The supplied advisory data rates the issue CVSS 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), indicating confidentiality impact without a corresponding integrity or availability impact.

Vendor
CODESYS
Product
FESTO
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-26
Original CVE updated
2026-03-17
Advisory published
2026-02-26
Advisory updated
2026-03-17

Who should care

OT and industrial automation teams running Festo Automation Suite with bundled or separately installed CODESYS components should treat this as a priority review item, especially where engineering workstations, visualization assets, or exposed management interfaces may be reachable from less-trusted networks. Security and operations teams should also verify which Festo/CODESYS versions are deployed and whether the affected configuration is present.

Technical summary

The issue described in the source advisory is a forced-browsing authorization bypass: an unauthenticated remote actor can access visualization resources that should be protected by user management. The result is limited read access to visualization template files or static elements. The advisory data and CVSS vector indicate a low-complexity network attack with no privileges or user interaction required, and a confidentiality-only impact. The provided source corpus associates the issue with Festo Automation Suite/CODESYS Visualization and references CWE-425 (improper control of path or directory access).

Defensive priority

Medium. The primary risk is unauthorized disclosure of visualization content and related configuration details, which can aid reconnaissance against OT environments. Because the vulnerability is unauthenticated and network-based, exposed deployments should be reviewed promptly and updated according to vendor guidance.

Recommended defensive actions

  • Inventory Festo Automation Suite installations and confirm whether affected CODESYS Visualization components are present.
  • Upgrade to Festo Automation Suite version 2.8.0.138 or later where applicable, and follow Festo's update guidance.
  • Install the latest patched CODESYS version directly from the official CODESYS website, as directed in the advisory.
  • Monitor CODESYS and Festo security advisories for follow-on updates or additional remediation guidance.
  • Restrict network exposure to engineering and visualization services using segmentation and access controls, especially on OT networks.
  • Review access control and authentication settings for visualization resources and remove unnecessary exposure.
  • Validate that Festo Automation Suite connector updates are applied as released by Festo.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory for ICSA-26-076-01, which republishes the Festo SE & Co. KG advisory material on 2026-03-17 after the initial 2026-02-26 publication date. The source description explicitly states that an unauthenticated remote attacker can bypass user management in CODESYS Visualization and read visualization template files or static elements via forced browsing. The CVSS vector in the source is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The provided prompt metadata contains a vendor attribution field marked low confidence and should be treated as needing review; the advisory content itself ties the issue to Festo Automation Suite with CODESYS components.

Official resources

Public advisory published on 2026-02-26T08:00:00.000Z and updated/republished on 2026-03-17T06:00:00.000Z. No KEV listing was provided in the supplied data.