Security Vulnerability in CODESYS V2.3 Runtime System

30. October 2012
Kempten, October 2012: Password protection bypass for CODESYS controllers

A security vulnerability which affects the CODESYS V2.3 Runtime System is currently being discussed on several different internet platforms: The password protection of a publicly accessible CODESYS controller can be bypassed with the help of an external tool. A password protected controller can then be accessed just like any unprotected PLC and it is possible to execute commands with the controller shell or load applications.

Of course, we take this issue very seriously. A fix version which resolves the reported vulnerability is now available for download for our direct OEM customers.

In general, we do not offer any standard tools in CODESYS which are to protect the controller from a serious cyber attack. Should the offered password functionality suggest such a protection, this was definitely not our intention. The implementation of standard security mechanisms (firewall, VPN access) is an absolute must when operating a PLC runtime system on a controller accessible through the internet.

More information