Article No° | Product Name | Affected Version(s) |
---|---|---|
750-8202/xxx-xxx | <= 03.07.14 (19) | |
750-8203/xxx-xxx | <= 03.07.14 (19) | |
750-8204/xxx-xxx | <= 03.07.14 (19) | |
750-8206/xxx-xxx | <= 03.07.14 (19) | |
750-8207/xxx-xxx | <= 03.07.14 (19) | |
750-8208/xxx-xxx | <= 03.07.14 (19) | |
750-8210/xxx-xxx | <= 03.07.14 (19) | |
750-8211/xxx-xxx | <= 03.07.14 (19) | |
750-8212/xxx-xxx | <= 03.07.14 (19) | |
750-8213/xxx-xxx | <= 03.07.14 (19) | |
750-8214/xxx-xxx | <= 03.07.14 (19) | |
750-8216/xxx-xxx | <= 03.07.14 (19) | |
750-8217/xxx-xxx | <= 03.07.14 (19) | |
750-823 | <= FW09 | |
750-829 | <= FW16 | |
750-831/000-00x | <= FW14 | |
750-832/000-00x | <= FW09 | |
750-852 | <= FW16 | |
750-862 | <= FW09 | |
750-880/0xx-xxx | <= FW16 | |
750-881 | <= FW16 | |
750-882 | <= FW16 | |
750-885/0xx-xxx | <= FW16 | |
750-889 | <= FW16 | |
750-890/0xx-xxx | <= FW09 | |
750-891 | <= FW09 | |
750-893 | <= FW09 |
Multiple vulnerabilities were reported in CODESYS 2.3 Runtime. The CODESYS 2.3 Runtime is an essential component in several WAGO PLCs. All vulnerable PLCs are listed in chapter ‘Affected Products’.
https://www.codesys.com/security/security-reports.html
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
The reported vulnerabilities allow an attacker who has access to the device and is able to exploit the vulnerabilities, to manipulate and disrupt the CODESYS 2.3 Runtime or WebVisualisation.
UPDATE A: fixed Firmware versions for 750-890/0xx-xxx, 750-891 and 750-893
We recommend all effected users with CODESYS 2.3 Runtime PLCs to update to the firmware version listed below.
Series Ethernet Controller
Article Number | Fixed Firmware Versions |
Available |
750-823 | >=FW10 | January 2022 |
750-829 | >=FW17 | After BACnet certification |
750-831/000-00x | >=FW17 | After BACnet certification |
750-832/000-00x | >=FW10 | After BACnet certification |
750-852 | >=FW17 | Q1 2022 |
750-862 | >=FW10 | January 2022 |
750-880/0xx-xxx | >=FW17 | Q1 2022 |
750-881 | >=FW17 | Q1 2022 |
750-882 | >=FW17 | Q1 2022 |
750-885/0xx-xxx | >=FW17 | Q1 2022 |
750-889 | >=FW17 | Q1 2022 |
750-890/0xx-xxx | >=FW10 | January 2022 |
750-891 | January 2022 | |
750-893 | January 2022 |
PFC200 Controller
Article Number | Affected Firmware Versions |
Approx. Available |
750-8202/xxx-xxx | >=FW20 | January 2022 |
750-8203/xxx-xxx | ||
750-8204/xxx-xxx | ||
750-8206/xxx-xxx | ||
750-8207/xxx-xxx | ||
750-8208/xxx-xxx | ||
750-8210/xxx-xxx | ||
750-8211/xxx-xxx | ||
750-8212/xxx-xxx | ||
750-8213/xxx-xxx | ||
750-8214/xxx-xxx | ||
750-8216/xxx-xxx | ||
750-8217/xxx-xxx |
Mitigation
For further impact information and risk mitigation, please refer to the official CODESYS Advisory Website at https://www.codesys.com/security/security-reports.html
These vulnerabilities were reported by
Coordination done by CERT@VDE.