CODESYS Control V3 - Untrusted boot application
The CODESYS Control runtime system allows users in the restricted Service group to replace the boot application without requiring cryptographic validation if application signing is not enforced. This permission is intended for maintenance operations but can be abused by an attacker with Service-level credentials to install an arbitrary boot application and gain full control of the controller. When application signing is disabled (the default), users in the Service group or any group with "Add/Remove" or "Modify" permissions on boot application files can upload and execute malicious code on the device.
- Valid Service-level or equivalent user credentials for the CODESYS Control system
- Network access to the CODESYS Control runtime system management interface
- Application signing not enforced (SECURITY.EnforceSignedCode set to NO or default)
- Ability to upload files to the boot application location
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3453b62d-e0d6-45cd-b31f-1e08a8446031Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.