Schneider Electric devices using CODESYS Runtime
Multiple vulnerabilities in CODESYS V3 runtime communication server affect many Schneider Electric products. These flaws (CWE-119, CWE-787, CWE-20 and others related to buffer overflows and input validation) can be exploited to cause denial of service or remote code execution on Modicon Controllers (M241, M251, M262, M258, LMC058, LMC078, M218), PacDrive 3 controllers, HMISCU controllers, Harmony HMI panels, and EcoStruxure Machine Expert embedded SoftSPS. Several older models (M258, LMC058, LMC078, M218, and older Harmony/Magelis lines) are end-of-life and will not receive patches.
- Network access to the CODESYS V3 communication server port on the controller
- Valid engineering credentials for remote code execution scenarios
- Device must be running one of the listed Schneider Electric products with embedded CODESYS runtime
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d8fa40ad-cbdd-42a2-b1d6-b129f7f24cadGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.