3S-Smart Software Solutions GmbH CODESYS V3 Products
Two vulnerabilities in CODESYS V3 products (CWE-923 and CWE-330) allow remote attackers to spoof the source of communication packets and exploit weak random number generation. These issues affect the confidentiality and integrity of data stored on controllers running CODESYS, including all CODESYS Control runtime variants (BeagleBone, emPC-A, IOT2000, Linux, PFC100/200, Raspberry Pi, RTE V3, Win V3), development tools, HMI, gateway, OPC server, and safety-certified versions. The vulnerabilities enable attackers without credentials to disguise malicious traffic or compromise cryptographic protections.
- Network access to the CODESYS device on port 2455 or other controller communication ports
- No authentication required to send forged packets or access weak random number generation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ee6a8dde-d1d5-4df6-8608-5c4bf5d3cd27Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.