CVE-2022-47379

8.8 HIGH

📋 TL;DR

CVE-2022-47379 is an out-of-bounds write vulnerability in multiple CODESYS industrial automation products that allows authenticated remote attackers to write arbitrary data to memory. This can lead to denial-of-service, memory corruption, or remote code execution. Organizations using affected CODESYS products in industrial control systems are at risk.

💻 Affected Systems

Products:
  • CODESYS Control runtime systems
  • CODESYS Development System
  • CODESYS Gateway
  • CODESYS OPC UA Server
  • CODESYS Safety runtime systems
Versions: Multiple versions prior to V3.5.19.0, V4.1.0.0, and V4.2.0.0
Operating Systems: Windows, Linux, Various real-time operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; affects both development and runtime environments in industrial control systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to take control of industrial processes and critical infrastructure.

🟠

Likely Case

Denial-of-service conditions disrupting industrial operations, with potential for memory corruption affecting system stability.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent attacker access to vulnerable systems.

🌐 Internet-Facing: HIGH if vulnerable CODESYS systems are exposed to the internet without proper controls.
🏢 Internal Only: MEDIUM to HIGH depending on internal network segmentation and authentication requirements.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access; exploitation complexity depends on specific memory layout and target system configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.5.19.0, V4.1.0.0, or V4.2.0.0 depending on product line

Vendor Advisory: https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=

Restart Required: Yes

Instructions:

1. Identify affected CODESYS products and versions. 2. Download appropriate patches from CODESYS customer portal. 3. Apply patches following vendor instructions. 4. Restart affected systems. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate CODESYS systems from untrusted networks and implement strict firewall rules.

Authentication Hardening

all

Implement strong authentication mechanisms and limit user access to only necessary functions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems from untrusted networks
  • Enforce strong authentication controls and limit user privileges to minimum required

🔍 How to Verify

Check if Vulnerable:

Check CODESYS product versions against affected version ranges in vendor advisory

Check Version:

Check version in CODESYS development environment or runtime system configuration

Verify Fix Applied:

Verify installed version is V3.5.19.0, V4.1.0.0, or V4.2.0.0 or later

📡 Detection & Monitoring

Log Indicators:

  • Unexpected authentication attempts
  • Memory access violations
  • Process crashes in CODESYS components

Network Indicators:

  • Unusual traffic patterns to CODESYS ports (typically 1217, 2455, 11740)

SIEM Query:

source="codesys" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export