Skip to content
Threat Feed
critical advisory

CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS

Multiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.

Multiple vulnerabilities have been identified in CODESYS, a software platform widely used for industrial automation. These vulnerabilities, if exploited, could allow a remote attacker to execute arbitrary program code on affected systems and/or cause a denial-of-service (DoS) condition. Given the prevalence of CODESYS in critical infrastructure and manufacturing environments, these vulnerabilities pose a significant risk. Public details are limited, but the potential impact necessitates immediate action from defenders to identify and mitigate potentially vulnerable CODESYS installations. Successful exploitation can lead to significant disruption of industrial processes, data manipulation, and potentially physical damage depending on the affected systems.

Attack Chain

  1. Attacker identifies a vulnerable CODESYS installation accessible over the network (e.g., via Shodan or similar).
  2. Attacker crafts a malicious request specifically targeting one of the CODESYS vulnerabilities. Due to lack of specifics, this step is generic. Example attack vectors could include crafted network packets or malicious project files.
  3. The malicious request is sent to the vulnerable CODESYS service.
  4. The CODESYS service improperly processes the request due to the vulnerability.
  5. This improper processing leads to arbitrary code execution within the context of the CODESYS service.
  6. The attacker executes malicious code to gain control of the CODESYS runtime. This code could install a backdoor, modify control logic, or exfiltrate data.
  7. Alternatively, the malformed request triggers a denial-of-service condition, causing the CODESYS service or the entire system to crash.
  8. The attacker disrupts industrial processes or gains unauthorized access to the industrial control system.

Impact

Successful exploitation of these CODESYS vulnerabilities can have severe consequences, including unauthorized access to industrial control systems, disruption of critical infrastructure, data manipulation, and potentially physical damage. The number of affected systems is potentially large, given the widespread use of CODESYS in various sectors including manufacturing, energy, and transportation. A successful attack could lead to significant financial losses, reputational damage, and even safety risks.

Recommendation

  • Monitor network traffic for suspicious activity targeting CODESYS services. Use the network connection rule below to detect unusual processes connecting to CODESYS ports.
  • Implement strict network segmentation to limit the exposure of CODESYS installations to external networks.
  • Since specific CVEs are not available, regularly check the CODESYS website for security updates and apply them immediately.
  • Investigate any crashes or unexpected behavior of CODESYS services, using process creation logs with the process creation rule below to see if the crash was caused by a malicious process.

Detection coverage 2

Suspicious Process Connecting to CODESYS Ports

medium

Detects unusual processes establishing network connections to common CODESYS ports.

sigma tactics: initial_access techniques: T1190 sources: network_connection, windows

Unexpected Process Creation Under CODESYS Directory

high

Detects creation of new processes under the CODESYS installation directory which might indicate malicious activity

sigma tactics: execution techniques: T1059.004 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →