3S-Smart Software Solutions GmbH CODESYS V3 (Update A)
CODESYS V3 runtime systems and development tools contain a vulnerability in the CmpUserMgr (user management) component that allows attackers on the local network to intercept and steal user credentials transmitted during PLC communication and management operations. The vulnerability affects all versions of CODESYS Control runtime systems (for PFC200, Win V3, RTE V3, Linux, Raspberry Pi, BeagleBone, IOT2000, and other platforms) as well as the CODESYS Development System, Simulation Runtime, and HMI V3 components. Successful exploitation requires network-level access but could enable unauthorized access to modify control logic, configurations, or safety settings.
- Network access to the local network segment where CODESYS devices communicate
- Ability to sniff/capture network traffic (attacker on the same LAN or compromised network infrastructure)
- CODESYS devices actively communicating with engineering workstations or other management tools
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6c7e6fc9-f9f6-4b68-ac16-a75920c854d1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.