WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service
A denial-of-service vulnerability exists in WAGO Ethernet Controllers (3rd and 4th generation) and PFC200 controllers running CODESYS 2.3 runtime. An authenticated attacker can send a malformed packet to the CODESYS V2 runtime communication port, triggering improper handling of the packet that crashes the device and halts the PLC runtime. The vulnerability requires valid engineering credentials and network access to the controller's CODESYS communication interface. WAGO has released firmware updates to address this issue across all affected product lines.
- Network access to the PLC's CODESYS 2 runtime communication port
- Valid PLC engineering credentials or access to a programming workstation
- CODESYS 2 runtime enabled on the device
- Device running affected firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2f210910-cd75-4f8e-97f2-0698bc0d691eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.