Chained Vulnerabilities Let Attackers Backdoor Industrial Control Systems Running CODESYS
Explore critical vulnerabilities in CODESYS Control that risk industrial systems, prompting urgent updates to secure infrastructure.
By
Content Team
ON THIS PAGE
Want more insights like this?
Subscribe to our newsletter to get the latest software protection strategies delivered to your inbox.
By submitting your email, you consent to Codekeeper contacting you and agree to our privacy policy.
Researchers at Nozomi Networks Labs have uncovered three vulnerabilities in CODESYS Control, a widely used industrial PLC platform, that attackers can chain together to replace legitimate control applications with backdoored versions — ultimately gaining full admin access.
The flaws affect water treatment plants, energy grids, and manufacturing lines. An attacker with valid credentials can steal cryptographic keys, tamper with the boot application, and achieve root execution on restart.
CODESYS has patched all three issues in Runtime version 4.21.0.0 and now enforces mandatory code signing by default. Admins should update immediately and tighten network segmentation.
Source: Cybersecurity News
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo