Attackers Chain CODESYS Vulnerabilities to Backdoor Applications

Attackers Chain CODESYS Vulnerabilities to Backdoor Applications

Summary

Critical research detailing three new vulnerabilities in the CODESYS Control runtime, allow an authenticated attacker with low-level privileges.

Description

Critical research detailing three new vulnerabilities in the CODESYS Control runtime, allow an authenticated attacker with low-level privileges.

Original reporting

AFBytes is a read-only aggregator. Use the original source for full context and complete reporting.

Open original source

Related coverage