3S-Smart Software Solutions GmbH released a new version to mitigate a NULL pointer dereference vulnerability in its CODESYS Control V3 OPC UA Server, according to a report with CISA.
Successful exploitation of this remotely exploitable vulnerability, which 3S-Smart Software Solutions self-reported, could cause a denial-of-service.
NULL pointer dereference, which may trigger a denial-of-service condition. CVE-2019-13542 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.5.
The following CODESYS Control V3 runtime systems, all Versions 184.108.40.206 to 220.127.116.11, containing the CODESYS OPC UA Server supporting OPC UA Security, suffer from the issue:
• CODESYS Control for BeagleBone
• CODESYS Control for emPC-A/iMX6
• CODESYS Control for IOT2000
• CODESYS Control for Linux
• CODESYS Control for PFC100
• CODESYS Control for PFC200
• CODESYS Control for Raspberry Pi
• CODESYS Control RTE V3
• CODESYS Control RTE V3 (for Beckhoff CX)
• CODESYS Control Win V3 (also part of the CODESYS Development System setup)
• CODESYS Control V3 Runtime System Toolkit
In the vulnerability, sending specific crafted requests from a trusted OPC UA client may cause a
The product sees use mainly in the critical manufacturing sector. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Germany-based 3S-Smart Software Solutions GmbH released Version 18.104.22.168 to resolve this vulnerability for all affected CODESYS products.
Click on the CODESYS update page for more information on how to obtain the software update.
As part of a security strategy, 3S-Smart Software Solutions GmbH recommends the following general defense measures to reduce the risk of exploits:
• Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.
• Use firewalls to protect and separate the control system network from other networks.
• Use VPN (virtual private networks) tunnels if remote access is required.
• Activate and apply user management and password features.
• Limit the access to both development and control system by physical means, operating system features, etc.
• Protect both development and control system by using up to date virus detecting solutions.
For more information and general recommendations for protecting machines and plants, see also the CODESYS security whitepaper.
For more information, 3S-Smart Software Solutions GmbH released a security report.