CVE-2021-34584

9.1 CRITICAL

📋 TL;DR

CVE-2021-34584 is a buffer over-read vulnerability in the CODESYS V2 web server that allows attackers to read partial stack or heap memory or cause denial-of-service through crafted web requests. This affects industrial control systems using CODESYS V2 web server prior to version 1.1.9.22. Organizations using CODESYS automation software with exposed web interfaces are at risk.

💻 Affected Systems

Products:
  • CODESYS V2 web server
Versions: All versions prior to V1.1.9.22
Operating Systems: All platforms running CODESYS V2 web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects CODESYS V2 web server component specifically; other CODESYS components may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents including credentials, configuration data, or process information, potentially leading to further system compromise.

🟠

Likely Case

Denial-of-service through web server crashes disrupting industrial control system operations and availability.

🟢

If Mitigated

Limited impact if web server is isolated behind firewalls with restricted network access and proper segmentation.

🌐 Internet-Facing: HIGH - Directly exposed web servers can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Tenable Research published technical details and proof-of-concept; exploitation requires sending crafted HTTP requests to vulnerable web server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V1.1.9.22

Vendor Advisory: https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download=

Restart Required: Yes

Instructions:

1. Download CODESYS V2 web server version 1.1.9.22 or later from CODESYS customer portal. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the web server service. 5. Verify successful update.

🔧 Temporary Workarounds

Network segmentation and access control

all

Restrict network access to CODESYS web server using firewalls and network segmentation

Disable web server if not required

all

Turn off CODESYS V2 web server component if not needed for operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate CODESYS systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block suspicious HTTP requests patterns

🔍 How to Verify

Check if Vulnerable:

Check CODESYS web server version via web interface or configuration files; versions below 1.1.9.22 are vulnerable.

Check Version:

Check CODESYS configuration or web interface for version information; specific command varies by installation.

Verify Fix Applied:

Verify installed version is 1.1.9.22 or higher and test web server functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP request patterns to CODESYS web server
  • Web server crash/restart events in system logs
  • Memory access errors in application logs

Network Indicators:

  • Crafted HTTP requests with abnormal parameters or lengths to CODESYS web server port (typically 80/443)

SIEM Query:

source="codesys_webserver" AND (http_request_length>threshold OR http_uri_contains_suspicious_patterns)

🔗 References

📤 Share & Export