3S-Smart Software Solutions GmbH CODESYS V3 Products Containing a CODESYS Communication Server
The CODESYS Communication Server in CODESYS V3 and related products (version prior to 3.5.15.0) contains a vulnerability that allows a remote attacker to crash the communication server by sending a malformed packet (CWE-390 – Incomplete Check or Handling of Exceptional Conditions). This results in a denial-of-service condition, preventing the controller or gateway from responding to legitimate commands until the service is restarted. All CODESYS Control variants (emPC-A/iMX6, RTE V3 for Beckhoff, Raspberry Pi, Win V3, BeagleBone, Linux, PFC200, PFC100, IOT2000), CODESYS HMI V3, CODESYS Gateway V3, CODESYS V3 Safety SIL2, and the V3 Simulation Runtime are affected.
- Network access to CODESYS Communication Server port (default 2455 or configured port)
- CODESYS product running version prior to 3.5.15.0
- No authentication required to trigger the crash
Patching may require device reboot — plan for process interruption
/api/v1/advisories/47c91afc-28d0-4bc7-a1fe-a69bfa49bd95Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.