Back to overview

CODESYS: Control runtime system memory and integrity check vulnerabilities

VDE-2023-025
Last update
08/03/2023 13:18
Published at
08/03/2023 13:18
Vendor(s)
CODESYS GmbH
External ID
VDE-2023-025
CSAF Document

Summary

The CODESYS Control V3 runtime system does not restrict the memory accesses of the PLC application code to the PLC application data and does not sufficiently check the integrity of the application code by default. This could be exploited by authenticated PLC programmers.

Impact

The CODESYS Control runtime system enables embedded or PC-based devices to be a programmable industrial controller. Control programs (PLC application code) can access local or remote IOs, communication interfaces such as serial or sockets, or the file system.

Affected Product(s)

Model no. Product name Affected versions
CODESYS Control RTE (SL) vers:all/* CODESYS Control RTE (SL) vers:all/*
CODESYS Control RTE (for Beckhoff CX) SL vers:all/* CODESYS Control RTE (for Beckhoff CX) SL vers:all/*
CODESYS Control Runtime System Toolkit vers:all/* CODESYS Control Runtime System Toolkit vers:all/*
CODESYS Control Win (SL) vers:all/* CODESYS Control Win (SL) vers:all/*
CODESYS Control for BeagleBone SL vers:all/* CODESYS Control for BeagleBone SL vers:all/*
CODESYS Control for IOT2000 SL vers:all/* CODESYS Control for IOT2000 SL vers:all/*
CODESYS Control for Linux SL vers:all/* CODESYS Control for Linux SL vers:all/*
CODESYS Control for PFC100 SL vers:all/* CODESYS Control for PFC100 SL vers:all/*
CODESYS Control for PFC200 SL vers:all/* CODESYS Control for PFC200 SL vers:all/*
CODESYS Control for PLCnext SL vers:all/* CODESYS Control for PLCnext SL vers:all/*
CODESYS Control for Raspberry Pi SL vers:all/* CODESYS Control for Raspberry Pi SL vers:all/*
CODESYS Control for WAGO Touch Panels 600 SL vers:all/* CODESYS Control for WAGO Touch Panels 600 SL vers:all/*
CODESYS Control for emPC-A/iMX6 SL vers:all/* CODESYS Control for emPC-A/iMX6 SL vers:all/*
CODESYS HMI (SL) vers:all/* CODESYS HMI (SL) vers:all/*

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
Summary

In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.

References

Published
09/22/2025 14:58
Weakness
Improper Validation of Integrity Check Value (CWE-354)
Summary

The PLC application code executed by the CODESYS Control Runtime contains a checksum. This enables the CODESYS development system to check at login whether its loaded project matches the PLC application code executed on the controller. This checksum is not sufficient to reliably detect PLC application code that has been modified in memory or boot application files that have been manipulated.

References

Mitigation

To exploit these vulnerabilities, a successful login to the affected product is required. The online user management therefore protects from exploiting these security vulnerabilities.

CODESYS GmbH strongly recommends using the online user management. This not only prevents from downloading malicious code or boot application files, but also suppresses starting, stopping, debugging or other actions on a known working application that could potentially disrupt a machine or system. As of version 3.5.17.0, the online user management is enforced by default.

In addition, the CODESYS Development System and the CODESYS Control runtime system support optional signing and encryption of the application code loaded on the controller. This feature also prevents the loading and execution of untrusted or modified boot files. If the application code security policy is set to "Enforced Signing", a modified or untrusted application will be detected due to a missing signature and will not be loaded and executed.

Revision History

Version Date Summary
1 08/03/2023 13:18 Initial revision.