FESTO CODESYS
CODESYS Gateway Server V2 (all versions prior to V2.3.9.38) is vulnerable to two attack vectors: (1) unauthenticated denial-of-service via crafted requests that trigger excessive memory allocation or exhaust TCP client connections, causing the gateway to become unavailable; (2) insufficient password validation during login allowing weak or easily guessed credentials to grant unauthorized access. CODESYS Gateway Server acts as the communication bridge between engineering workstations and industrial controllers (PLCs, RTUs). If the gateway becomes unavailable, operators cannot modify control logic, troubleshoot issues, or deploy updates. If an attacker gains login access, they can view and modify control program code, alter process parameters, or inject malicious logic into the running system.
- Network reachability to CODESYS Gateway Server port 2455
- No authentication credentials required for denial-of-service attacks
- Valid user credentials (weak validation) or ability to guess passwords for unauthorized login
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7499e922-2a43-47fb-a042-b411c84cd7dfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.