CODESYS Control - Linux/QNX SysSocket flaw
A flaw exists in the SysSocket implementation of the CODESYS Control runtime abstraction layer on Linux and QNX systems. The vulnerability is caused by incorrect internal handling and can lead to an out-of-bounds memory read. An unauthenticated attacker can exploit this vulnerability via socket-based communication by sending a specially crafted message and winning a race condition, potentially causing a crash of the communication task. This affects the CODESYS runtime itself and client applications such as PLCHandler running on Linux or QNX that connect to a malicious server.
- Network access to the socket port used by CODESYS Control or client applications
- The target device runs a vulnerable version on Linux or QNX operating system
- Attacker must win a race condition during socket communication (increases attack complexity)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4d666528-d7b8-4b07-b287-f8486d89524cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.