PatchSiren

PatchSiren cyber security CVE debrief

CVE-2010-5250 Festo CVE debrief

CVE-2010-5250 describes a local privilege-escalation risk caused by an untrusted search path in pthread_win32_process_attach_np inside pthreadGC2.dll. In the supplied CISA CSAF context, the issue is republished for Festo Automation Suite/CODESYS deployments and mitigated by moving to Festo Automation Suite 2.8.0.138 or later and applying the latest CODESYS fixes.

Vendor
Festo
Product
Unknown
CVSS
HIGH 7.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-09-30
Original CVE updated
2025-11-13
Advisory published
2025-09-30
Advisory updated
2025-11-13

Who should care

OT/ICS administrators, Windows engineering-workstation owners, and any team running Festo Automation Suite with bundled CODESYS components should review this advisory. It matters most where untrusted local users can influence the working directory or where privileged processes start from writable paths.

Technical summary

The CVE text says Pthreads-win32 2.8.0 has an untrusted search path issue in pthread_win32_process_attach_np within pthreadGC2.dll. If a malicious quserex.dll is placed in the current working directory, the process may load that Trojan horse DLL and a local attacker can gain elevated privileges. The CISA-republished advisory maps the impacted packaging to Festo Automation Suite versions below 2.8.0.138 and specific bundled CODESYS Development System combinations.

Defensive priority

High

Recommended defensive actions

  • Upgrade Festo Automation Suite to version 2.8.0.138 or later, where CODESYS is no longer bundled with the suite.
  • Install the latest patched CODESYS release directly from the official CODESYS website and follow the vendor’s update instructions.
  • Audit engineering workstations and service accounts so privileged processes do not run from user-writable directories.
  • Monitor CISA, Festo, and CERTVDE advisories for follow-up updates and apply patches promptly.

Evidence notes

This debrief relies on the supplied CISA CSAF source item and its linked official references. The source description explicitly notes that some details come from third-party information, so vendor/product attribution should be treated carefully. The advisory metadata ties the issue to Festo Automation Suite/CODESYS packaging, while the CVE description itself names Pthreads-win32 2.8.0 and pthreadGC2.dll; that context mismatch is preserved rather than resolved here.

Official resources

Use the supplied CVE publication date of 2026-02-26 and modification date of 2026-03-17 for timing context. The source advisory was initially published on 2026-02-26 and republished/updated by CISA on 2026-03-17. The source explicitly says,