The CODESYS Control V3 runtime system does not restrict the memory accesses of the PLC application code to the PLC application data and does not sufficiently check the integrity of the application code by default. This could be exploited by authenticated PLC programmers.
The CODESYS Development System does not limit the number of attempts to guess the password within an import dialog.
The Notification Center of the CODESYS Development System receives messages without ensuring that the message was not modified during transmission. This finally enables MITMs code execution when the user clicks the "Learn More" button.
The CODESYS Development System is vulnerable to the execution of malicious binaries from the current working directory.
CODESYS Control V3 runtime systems are affected by several security vulnerabilities in the communication server implementations for the CODESYS protocol. These may be exploited by authenticated attackers.
Multiple WAGO devices are prone to vulnerabilites in the used CODESYS V3 framework.
A vulnerability allows Bluetooth LE pairing traffic to be sniffed and used to bypass authentication for pairing.