Skip to main

Vulnerabilities in CODESYS V2 runtime systems

BOSCH-SA-670099

Advisory Information

Summary

The compact systems CS351E and CS351S and the communication module KE350G with integrated PLC contain technology from CODESYS GmbH. The manufacturer CODESYS GmbH published security bulletins [1][2] about a weakness in the protocol for the communication between the PLC runtime and clients. By exploiting these vulnerabilities, attackers can send crafted communication packets which may result in a denial of service condition or allow in worst case remote code execution.

Please note: Versions below V.2600 are EoL and not supported anymore.

Affected Products

  • Rexroth CS351E-D IL > V2.300
  • Rexroth CS351E-D IL <= V2.800
  • Rexroth CS351E-G IL > V2.300
  • Rexroth CS351E-G IL <= V2.800
  • Rexroth CS351S-D IL > V2.300
  • Rexroth CS351S-D IL <= V2.800
  • Rexroth CS351S-G IL > V2.300
  • Rexroth CS351S-G IL <= V2.800
  • Rexroth KE350G IL > V2.300
  • Rexroth KE350G IL <= V2.800

Solution and Mitigations

Mitigations

Bosch Rexroth recommends to operate the product in a closed (machine) network with no access to the internet and implement the following compensatory measures:

  • Minimize network exposure and ensure that the products are not accessible via the Internet.

  • Network segmentation / Firewall: Isolate affected products from the corporate network.

  • If remote access is required, use secure methods such as virtual private networks (VPNs).

  • Activate and apply user management and password features.

With these measures the risk of exploitation of these vulnerabilities is very low.

Vulnerability Details

CVE-2021-30186

CVE description: CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.

CVE-2021-30188

CVE description: CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow.

CVE-2021-30189

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow.

CVE-2021-30190

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.

CVE-2021-30191

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input.

CVE-2021-30192

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check.

CVE-2021-30193

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write.

CVE-2021-30194

CVE description: CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read.

CVE-2021-30195

CVE description: CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.

Remark

Vulnerability classification has been performed using the CVSS v3.1 scoring system . The CVSS environmental score is specific to each customer’s environment and should be defined by the customer to attain a final scoring.

Additional Resources

Please contact the Bosch PSIRT if you have feedback, comments, or additional information about this vulnerability at: psirt@bosch.com .

Revision History

  • 20 Jul 2021: Initial Publication