CODESYS Control V3 - Untrusted boot application
The CODESYS Control runtime system includes user privilege groups (Administrators, Developers, Service) intended to restrict sensitive operations. The Service group is designed for maintenance and can replace boot applications. However, the CmpApp component does not validate the cryptographic signature of boot applications if signature enforcement is disabled. A Service-group user can therefore install and execute an arbitrary boot application on the controller, bypassing the normal application loading controls. This vulnerability affects multiple CODESYS Control runtime editions across various hardware platforms (RTE, Win, Linux, Raspberry Pi, WAGO, Beckhoff, etc.) in versions before 3.5.22.0 or 4.21.0.0 depending on the product line.
- Service-level user credentials or equivalent account with modify permissions on boot application files
- Network or physical access to upload files to the device
- Application signing enforcement (SECURITY.EnforceSignedCode) must be disabled in the runtime configuration
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3453b62d-e0d6-45cd-b31f-1e08a8446031