CODESYS: Vulnerability in multiple products through exposure of resource to wrong sphere
All legitimate local Windows users on machines running affected CODESYS products can read or modify files in the working directory, regardless of which user account the software runs under. This allows unauthorized access to control logic, configuration data, and sensitive engineering files. The vulnerability stems from improper file permission isolation between user contexts on Windows. Affected products: CODESYS Control Win, Development System V3, Edge Gateway for Windows, Gateway for Windows, and HMI (all versions before 3.5.20.10).
- Local user account on the Windows machine where CODESYS software is installed
- No special privileges required; standard user permissions are sufficient
Patching may require device reboot — plan for process interruption
/api/v1/advisories/558f339c-ddb7-4fb4-8372-f83f917e3670Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.