<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Chained Vulnerabilities Let Attackers Backdoor Industrial Control Systems Running CODESYS

Explore critical vulnerabilities in CODESYS Control that risk industrial systems, prompting urgent updates to secure infrastructure.
Content Team

Researchers at Nozomi Networks Labs have uncovered three vulnerabilities in CODESYS Control, a widely used industrial PLC platform, that attackers can chain together to replace legitimate control applications with backdoored versions — ultimately gaining full admin access.

The flaws affect water treatment plants, energy grids, and manufacturing lines. An attacker with valid credentials can steal cryptographic keys, tamper with the boot application, and achieve root execution on restart.

CODESYS has patched all three issues in Runtime version 4.21.0.0 and now enforces mandatory code signing by default. Admins should update immediately and tighten network segmentation.

Source: Cybersecurity News

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo