Pilz: Multiple vulnerabilities in CODESYS V2 and V3 runtime system
Multiple vulnerabilities exist in the CODESYS V2 and V3 runtime systems used by Pilz motion controllers and operator terminals. These runtime environments enable execution of IEC 61131-3 PLC programs. An attacker on the network can exploit these vulnerabilities to reduce availability and, in worst case scenarios, insert malicious program code into the controller. Vulnerabilities include buffer overflows, null pointer dereferences, improper input validation, and lack of security checks. The CODESYS V2 runtime is no longer supported by Pilz but remains included for compatibility. PMCprimo C and PMI 6 primo have no fix available.
- Network access to the controller (CODESYS runtime port)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d01b6527-400b-4f80-86f2-5d740f9303d6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.