3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server
The CODESYS Control OPC UA server contains a null pointer dereference vulnerability (CWE-476) that can be triggered by a malformed OPC UA request from an authenticated user. The flaw exists in all versions from 3.5.11.0 through 3.5.15.0 across all CODESYS Control platforms including runtime systems for Beckhoff, WAGO, Raspberry Pi, BeagleBone, and Windows systems. Successful exploitation causes the OPC UA server to crash, resulting in denial of service for applications relying on that server for real-time data exchange or commands.
- Network access to OPC UA server port (default 4840)
- Valid OPC UA user credentials
- OPC UA service must be enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c24daed8-5816-4bb4-af39-8f0b063ff05eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.