Your one-stop web resource providing safety and security information to manufacturers

3S-Smart Software Solutions GmbH released a new version to mitigate an improper input validation vulnerability in its CODESYS V3 products containing a CODESYS communication server, according to a report with CISA.

Successful exploitation of this remotely exploitable vulnerability, discovered by Martin Hartmann from cirosec GmbH, could cause a denial-of-service condition.

In the vulnerability, a crafted request may cause an unhandled error in the affected CODESYS products, which results in a denial-of-service condition. CVE-2019-9009 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

The following CODESYS V3 runtime systems, all versions prior to 3.5.15.0 containing communication servers for the CODESYS communication protocol, are affected:
• CODESYS Control for BeagleBone
• CODESYS Control for emPC-A/iMX6
• CODESYS Control for IOT2000
• CODESYS Control for Linux
• CODESYS Control for PFC100
• CODESYS Control for PFC200
• CODESYS Control for Raspberry Pi
• CODESYS Control RTE V3
• CODESYS Control RTE V3 (for Beckhoff CX)
• CODESYS Control Win V3 (part of the CODESYS Development System setup)
• CODESYS Control V3 Runtime System Toolkit
• CODESYS V3 Safety SIL2
• CODESYS Gateway V3
• CODESYS HMI V3
• CODESYS V3 Simulation Runtime (part of the CODESYS Development System)

Cyber Security

The products see use mainly in the critical manufacturing sector. They also see action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

Germany-based 3S-Smart Software Solutions GmbH released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products.

Click on the CODESYS update page for more information on how to obtain the software update.

As part of a security strategy, 3S-Smart Software Solutions GmbH recommends the following general defense measures to reduce the risk of exploits:
• Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside
• Use firewalls to protect and separate the control system network from other networks
• Use VPN (virtual private networks) tunnels if remote access is required
• Activate and apply user management and password features
• Limit the access to development and control system by physical means, operating system features
• Protect development and control system by using up to date virus detecting solutions

For more information and general recommendations for protecting machines and plants, see also the CODESYS security whitepaper.

For more information, 3S-Smart Software Solutions GmbH released a security report.

Pin It on Pinterest

Share This