CODESYS Runtime Vulnerabilities
Multiple vulnerabilities in CODESYS Runtime embedded in Schneider Electric controllers could result in denial of service or remote code execution. Affected products include PacDrive 3 Controllers (LMC Eco/Pro/Pro2), Modicon Controllers (M241, M251, M262, M258, M218, LMC058), and Harmony HMISCU. Successful exploitation could compromise controller integrity and allow attackers to alter logic or change permissions on industrial control devices. Most products have no fix available; partial remediation exists for CVE-2022-4224 in select models via firmware updates delivered through Machine Expert v2.2 or Vijeo Designer v6.3.1.
- Network access to the CODESYS Runtime service on affected controllers (typically port 2455 or 11740)
- Valid engineering workstation credentials or access to the engineering software (Machine Expert or Vijeo Designer)
- Access to the controller management interface to deploy code or firmware updates
- Typically requires intra-plant network access; not remotely exploitable across internet without VPN/DMZ exposure
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d63c07f8-ea28-4d72-8f88-d79717596437Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.