Vulnerabilites related to codesys - git
cve-2021-34599
Vulnerability from cvelistv5
Published
2021-12-01 09:00
Modified
2024-09-17 02:32
Severity ?
EPSS score ?
Summary
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CODESYS | CODESYS Git |
Version: CODESYS Git < V1.1.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:47.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Git", "vendor": "CODESYS", "versions": [ { "lessThan": "V1.1.0.0", "status": "affected", "version": "CODESYS Git", "versionType": "custom" } ] } ], "datePublic": "2021-12-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-01T09:00:15", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download" } ], "solutions": [ { "lang": "en", "value": "CODESYS GmbH has released CODESYS Git V1.1.0.0 to solve this vulnerability issue.\nCODESYS Git V1.1.0.0 can be downloaded and installed directly with the CODESYS Installer. CODESYS Git\nrequires a CODESYS Development System version of V3.5.17.0 or newer." } ], "source": { "discovery": "INTERNAL" }, "title": "Improper Certificate Validation in CODESYS Git", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-12-01T07:00:00.000Z", "ID": "CVE-2021-34599", "STATE": "PUBLIC", "TITLE": "Improper Certificate Validation in CODESYS Git" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Git", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "CODESYS Git", "version_value": "V1.1.0.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download", "refsource": "CONFIRM", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download" } ] }, "solution": [ { "lang": "en", "value": "CODESYS GmbH has released CODESYS Git V1.1.0.0 to solve this vulnerability issue.\nCODESYS Git V1.1.0.0 can be downloaded and installed directly with the CODESYS Installer. CODESYS Git\nrequires a CODESYS Development System version of V3.5.17.0 or newer." } ], "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-34599", "datePublished": "2021-12-01T09:00:15.883759Z", "dateReserved": "2021-06-10T00:00:00", "dateUpdated": "2024-09-17T02:32:29.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-12-01 09:15
Modified
2024-11-21 06:10
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | git | * | |
codesys | development_system | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:git:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38BAFA3-A5E3-4DF4-94DE-8798CADEFE90", "versionEndExcluding": "1.1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE05318E-4AB4-4DEB-8E13-B152C27C7436", "versionEndExcluding": "3.5.17.0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack." }, { "lang": "es", "value": "Las versiones afectadas de CODESYS Git en Versiones anteriores a V1.1.0.0, carecen de la comprobaci\u00f3n de certificados en los protocolos de enlace HTTPS. CODESYS Git no implementa la comprobaci\u00f3n de certificados por defecto, por lo que no comprueba que el servidor proporcione un certificado HTTPS v\u00e1lido y confiable. Dado que el certificado del servidor con el que es realizada la conexi\u00f3n no es verificado apropiadamente, la conexi\u00f3n del servidor es vulnerable a un ataque de tipo man-in-the-middle" } ], "id": "CVE-2021-34599", "lastModified": "2024-11-21T06:10:47.380", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-01T09:15:06.627", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16959\u0026token=3ce11e44a3277c4520d732ea2e630f2e06bd46ff\u0026download" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }