Attackers Chain CODESYS Vulnerabilities to Backdoor Applications
Nozomi Networks Labs published critical research detailing three new vulnerabilities in the CODESYS Control runtime. When chained together, these security flaws allow an authenticated attacker with low-level privileges to replace a legitimate industrial control application with a backdoored version.
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] ClickFix Attack Swaps PowerShell for Cmdkey, Remote Regsvr32 Payloads
- [CYBER] Vidar Malware Conceals Payloads in JPEG, TXT Files to Evade Detection
- [CYBER] Metabase Enterprise RCE Flaw Now Has Public Proof-of-Concept Exploit
- [CYBER] Fast16 Malware Targets High-Value Systems With Sabotage Capabilities
- [CYBER] Sri Lanka probes cyber heist of $2.5m debt payment meant for Australia
- [CYBER] Suspicious Microsoft Store App Vibing.exe Allegedly Harvests Screens and Audio