CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities
Schneider Electric and CODESYS have disclosed multiple vulnerabilities in CODESYS V3 Runtime, Development System, and Gateway components. These vulnerabilities are embedded in several Schneider products including Modicon M241/M251 controllers, Eurotherm E+PLC100/400 controllers, Harmony HMI panels, and EcoStruxure Machine Expert. Successful exploitation could result in remote code execution on affected controllers or denial of service. The vulnerabilities affect packet parsing (CWE-787), null pointer dereference (CWE-476), and unsafe deserialization (CWE-502) in the CODESYS runtime. No public exploit code exists at this time, but the vulnerabilities are of critical severity and should be addressed immediately.
- Network access to the CODESYS runtime port (e.g., TCP 2455, 11740, or product-specific port)
- No valid credentials required
- Vulnerable firmware version must be running (see affected product list)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/48054883-5f0a-45cf-ae6f-898453aa91c1