{"id":18693,"date":"2021-11-22T07:54:52","date_gmt":"2021-11-22T07:54:52","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=18693"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"codesys-v2-multiple-high-risk-vulnerabilities-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/","title":{"rendered":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of acknowledgement from CODESYS for NSFOCUS Gewu Lab&#8217;s reporting of three vulnerabilities that were rated high-risk. All of the three vulnerabilities are exploited for attacks via private communication protocols supported by CODESYS runtime. By using these vulnerabilities, attackers may cause a denial of service or downtime, or even enable the target to execute the maliciously compiled exploit code to produce an adverse impact on production, stay detected, steal sensitive data, and launch targeted attacks.<\/p>\n\n\n\n<p>CVE-2021-30188 (CVSS3.0 Score: 8.8): CWE-121: Stack-based Buffer Overflow<\/p>\n\n\n\n<p>By sending a specially-crafted request to the affected CODESYS products, attackers could cause a denial of service or remote code execution on the target.<\/p>\n\n\n\n<p>CVE-2021-34595 (CVSS3.0 Score: 8.1): CWE-823: Use of Out-of-range Pointer Offset<\/p>\n\n\n\n<p>By sending a specially-crafted request to the affected CODESYS products, attackers may cause a denial of service or local memory overwrite via out-of-bounds read or write.<\/p>\n\n\n\n<p>CVE-2021-34596 (CVSS3.0 Score: 8.1): CWE-824: Access of Uninitialized Pointer<\/p>\n\n\n\n<p>By sending a specially-crafted request to the affected CODESYS products, attackers may cause a denial of service via access to an uninitialized pointer. CODESYS is a manufacturer-independent IEC 61131-1 programming software and ICS device core (runtime SDK), released by the 3S-Smart Software Solutions Company in Germany, the world&acirc;&euro;&trade;s most renowned soft PLC kernel software R&amp;D manufacturer. As a standard hardware-independent runtime supported by many hardware vendors, CODESYS is compatible with programing environments compliant with the full version of IEC61131 and also supports six programing languages. Besides, CODESY complements portfolio products such as bus configuration programs and motion control systems in different fields. CODESYS runtime supports the following hardware platforms:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122.jpg\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"260\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122-1024x260.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-18694\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122-1024x260.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122-300x76.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122-768x195.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122-200x51.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/1122.jpg 1495w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Reference link: <a href=\"https:\/\/www.codesys.com\/security\/security-reports.html\">https:\/\/www.codesys.com\/security\/security-reports.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CODESYS Runtime Toolkit 32 bit &lt; V2.4.7.56<\/li><li>CODESYS PLCWinNT &lt; V2.4.7.56<\/li><\/ul>\n\n\n\n<p>Note: Besides CODESYS software products, these vulnerabilities affect industrial control manufacturers using CODESYS runtime kernel. Acting like Android in the ICS industry, CODESYS is widely used in ICS devices. According to official statistics, CODESYS, with a market share of 35%, is adopted by more than 500 well-known enterprises, including ABB, Schneider Electric, Festo, Eaton Electric, Bosch Rexroth, Beckhoff, Advantech, ADLINK, Hollysys, INOVANCE, INVT, Wuhan Huazhong Numerical Control and GOOGOL TECHNOLOGY.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official Fix<\/strong><\/p>\n\n\n\n<p>Currently, the preceding vulnerabilities have been fixed in the firmware version. The ICS manufacturers using the CODESYS runtime should check and upgrade your installation as soon as possible by downloading the update from <a href=\"https:\/\/www.codesys.com\/download\">https:\/\/www.codesys.com\/download<\/a><\/p>\n\n\n\n<p><strong>Other Protection Measures<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Deploy the affected products behind the security protection device that must provide defense-in-depth measures to protect network security.<\/li><li>When remote access is required, use the secure VPN network whenever possible and perform access audit.<\/li><li>Pay attention to the security patches of the affected manufacturers and upgrade the affected products after the testing to protect them from threats.<\/li><li>Minimize the risk of exposure of private communication ports of the affected device and choose to close ports such as 1200\/1201\/2455 according to actual business scenarios.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA). A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of acknowledgement from CODESYS for NSFOCUS Gewu Lab&#8217;s reporting of three vulnerabilities that were rated high-risk. All of the three vulnerabilities are exploited for attacks via private communication protocols supported by CODESYS runtime. By using [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":18696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[141,198,200],"class_list":["post-18693","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-codesys","tag-cve-2021-30188","tag-cve-2021-34596"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-22T07:54:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert\",\"datePublished\":\"2021-11-22T07:54:52+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Codesys_Logo.png-e1637567680459.png\",\"keywords\":[\"CODESYS\",\"CVE-2021-30188\",\"CVE-2021-34596\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/\",\"name\":\"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Codesys_Logo.png-e1637567680459.png\",\"datePublished\":\"2021-11-22T07:54:52+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Codesys_Logo.png-e1637567680459.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Codesys_Logo.png-e1637567680459.png\",\"width\":200,\"height\":160,\"caption\":\"CODESYS logo with red and grey cubes.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS","og_description":"Overview Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of","og_url":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-11-22T07:54:52+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS","twitter_description":"Overview Recently, CODESYS officially issued four security update advisories that fixed 10 vulnerabilities in CODESYS V2. NSFOCUS received a letter of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert","datePublished":"2021-11-22T07:54:52+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","keywords":["CODESYS","CVE-2021-30188","CVE-2021-34596"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/","name":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","datePublished":"2021-11-22T07:54:52+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/11\/Codesys_Logo.png-e1637567680459.png","width":200,"height":160,"caption":"CODESYS logo with red and grey cubes."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/codesys-v2-multiple-high-risk-vulnerabilities-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"CODESYS V2 Multiple High-Risk Vulnerabilities Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18693"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18693\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/18696"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}