ABB ACS880 Drives Containing CODESYS RTS
ABB ACS880 variable frequency drives contain multiple vulnerabilities in the embedded CODESYS Runtime System (CWE-20, CWE-787, CWE-119). These are input validation and buffer overflow flaws in the IEC online programming interface. An authenticated attacker with network access could achieve remote code execution on the drive or cause denial of service. The Primary Control Program (AINLX, YINLX), IGBT Supply Control Program (AISLX, ALHLX, YISLX, YLHLX) variants are patched in specified later versions. However, the Position Control Program (APCLX) and Test Bench Control Program (ATBLX) variants have no vendor fix available. Mitigation for unpatched drives includes disabling file download via parameter 196.102 bit 2 and restricting network access to the programming interface.
- Network access to the ACS880 drive's IEC programming communication port (typically port 11740)
- Valid engineering workstation credentials or ability to authenticate to the drive
- Older firmware versions (Primary variants < v3.47/v1.30, IGBT Supply variants < v3.43/v1.30)
- IEC online programming communication enabled (default in affected versions)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c008ccd1-f324-4644-8e45-86a258293dedGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.