Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CODESYS Vulnerabilities Allow App Backdoors

CODESYS Vulnerabilities Allow App Backdoors

Posted on April 27, 2026 By CWS

CODESYS, a leading software-based programmable logic controller (Soft PLC) platform, is facing critical security challenges due to multiple vulnerabilities, according to Nozomi Networks Labs. These vulnerabilities, when combined, can enable an attacker with authentication to substitute legitimate industrial control applications with malicious versions, gaining full administrative control of the targeted device.

Understanding the Impact of CODESYS Vulnerabilities

The widespread use of CODESYS in various industrial sectors—such as water treatment, energy, and automated manufacturing—amplifies the potential risks. Since PLCs directly manage physical processes, an exploited vulnerability could lead to production stoppages, equipment damage, or hazardous conditions.

The CODESYS Control runtime, responsible for managing real-time input/output and network communications in automated systems, is at the heart of these vulnerabilities. The newly identified security flaws affect file permissions and backup restoration processes.

Details of the Vulnerabilities

The vulnerabilities identified include CVE-2025-41658, which allows local users to read CODESYS password hashes due to incorrect default permissions, rated 5.5 (Medium). CVE-2025-41659, rated 8.3 (High), involves improper permissions that permit low-privilege users to access sensitive cryptographic data. Additionally, CVE-2025-41660, rated 8.8 (High), involves a flawed resource transfer process enabling the restoration of tampered boot applications.

To exploit these vulnerabilities, attackers first require valid Service-level credentials. This is typically prevented by standard security measures, but attackers can circumvent these through methods like default passwords, compromised engineering workstations, or by exploiting CVE-2025-41658 to extract password hashes.

Attack Workflow and Mitigation Strategies

The attack progresses through several stages: downloading the application using backup functionality, extracting cryptographic keys via CVE-2025-41659, and tampering with the binary to inject malicious code. The attacker then re-signs the tampered code and uses CVE-2025-41660 to upload it back, awaiting a system restart to execute with root privileges.

A compromised Soft PLC can drastically alter actuator behavior, modify safety setpoints, and override critical system controls. This attack method aligns with MITRE ATT&CK for ICS techniques like Manipulation of Control, Module Firmware modification, and Theft of Operational Information.

CODESYS Group has addressed these vulnerabilities in Control Runtime version 4.21.0.0 and Toolkit version 3.5.22.0. To enhance security, mandatory code signing has been implemented for all PLC code before deployment. Administrators are urged to apply these updates promptly, enforce strict network segmentation, and monitor network traffic for unusual activity.

Stay informed on the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:Backdoor, CODESYS, CVE-2025-41658, CVE-2025-41659, CVE-2025-41660, Cybersecurity, ICS, industrial automation, industrial control, network security, Nozomi Networks, PLC, security flaws, Software Security, Vulnerabilities

Post navigation

Previous Post: US Intensifies Efforts Against Southeast Asia Cybercrimes
Next Post: UNC6692 Deploys Snow Malware via Email Scams and Social Tactics

Related Posts

Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps Banking Trojans Attacking Android Users Mimic as Government and Legitimate Payment Apps Cyber Security News
Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content Cyber Security News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap MITRE Publishes Post-Quantum Cryptography Migration Roadmap Cyber Security News
GitGuardian Secures M to Enhance AI and Security Solutions GitGuardian Secures $50M to Enhance AI and Security Solutions Cyber Security News
New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection
  • UNC6692 Deploys Snow Malware via Email Scams and Social Tactics
  • CODESYS Vulnerabilities Allow App Backdoors
  • US Intensifies Efforts Against Southeast Asia Cybercrimes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns of Rising Malicious AI Prompt Injection Attacks
  • ClickFix Attack Evolves: New Tactics Bypass Detection
  • UNC6692 Deploys Snow Malware via Email Scams and Social Tactics
  • CODESYS Vulnerabilities Allow App Backdoors
  • US Intensifies Efforts Against Southeast Asia Cybercrimes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark