Attackers Chain CODESYS Vulnerabilities to Backdoor Applications
Summary
Critical research detailing three new vulnerabilities in the CODESYS Control runtime, allow an authenticated attacker with low-level privileges.
Description
Critical research detailing three new vulnerabilities in the CODESYS Control runtime, allow an authenticated attacker with low-level privileges.
Original reporting
AFBytes is a read-only aggregator. Use the original source for full context and complete reporting.
Open original source