Vulnerabilites related to codesys - hmi_sl
cve-2022-22514
Vulnerability from cvelistv5
Published
2022-04-07 18:21
Modified
2024-09-17 03:03
Severity ?
EPSS score ?
Summary
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Gateway", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Windows", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Development System V3", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Embedded Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Remote Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Beckhoff CX9020 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Linux", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "CWE-822: Untrusted Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T05:55:11", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "source": { "discovery": "UNKNOWN" }, "title": "Untrusted Pointer Dereference in multiple CODESYS products can lead to a DoS.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-04-06T10:00:00.000Z", "ID": "CVE-2022-22514", "STATE": "PUBLIC", "TITLE": "Untrusted Pointer Dereference in multiple CODESYS products can lead to a DoS." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Control RTE (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control RTE (for Beckhoff CX) SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Win (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Gateway", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Development System V3", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Runtime System Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Embedded Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Remote Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control for BeagleBone SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Beckhoff CX9020 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for emPC-A/iMX6 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for IOT2000 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Linux SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC100 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC200 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PLCnext SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Raspberry Pi SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for WAGO Touch Panels 600 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-822: Untrusted Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=", "refsource": "MISC", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-22514", "datePublished": "2022-04-07T18:21:14.309072Z", "dateReserved": "2022-01-03T00:00:00", "dateUpdated": "2024-09-17T03:03:50.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22517
Vulnerability from cvelistv5
Published
2022-04-07 18:21
Modified
2024-09-16 22:16
Severity ?
EPSS score ?
Summary
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Control RTE (SL) |
Version: V3.5.18.0 < V3.5.18.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Gateway", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Windows", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Development System V3", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Embedded Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Remote Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Beckhoff CX9020 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Linux", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS OPC DA Server SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS PLCHandler", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-334", "description": "CWE-334 Small Space of Random Values", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-07T18:21:19", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=" } ], "source": { "discovery": "UNKNOWN" }, "title": "Communication Components in multiple CODESYS products vulnerable to communication channel disruption", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-04-06T10:00:00.000Z", "ID": "CVE-2022-22517", "STATE": "PUBLIC", "TITLE": "Communication Components in multiple CODESYS products vulnerable to communication channel disruption" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Control RTE (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control RTE (for Beckhoff CX) SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Win (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Gateway", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Development System V3", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Runtime System Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Embedded Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Remote Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control for BeagleBone SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Beckhoff CX9020 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for emPC-A/iMX6 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for IOT2000 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Linux SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC100 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC200 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PLCnext SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Raspberry Pi SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for WAGO Touch Panels 600 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS OPC DA Server SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS PLCHandler", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-334 Small Space of Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=", "refsource": "MISC", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-22517", "datePublished": "2022-04-07T18:21:20.091353Z", "dateReserved": "2022-01-03T00:00:00", "dateUpdated": "2024-09-16T22:16:04.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20025
Vulnerability from cvelistv5
Published
2019-02-19 21:00
Modified
2024-09-16 18:39
Severity ?
EPSS score ?
Summary
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106251 | vdb-entry, x_refsource_BID | |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/ | x_refsource_MISC | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Kaspersky Lab | CODESYS V3 products |
Version: prior V3.5.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:18.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106251", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106251" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS V3 products", "vendor": "Kaspersky Lab", "versions": [ { "status": "affected", "version": "prior V3.5.14.0" } ] } ], "datePublic": "2018-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0." } ], "problemTypes": [ { "descriptions": [ { "description": "Use of Insufficiently Random Values", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T14:40:07", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "106251", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106251" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnerability@kaspersky.com", "DATE_PUBLIC": "2018-12-10T00:00:00", "ID": "CVE-2018-20025", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS V3 products", "version": { "version_data": [ { "version_value": "prior V3.5.14.0" } ] } } ] }, "vendor_name": "Kaspersky Lab" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use of Insufficiently Random Values" } ] } ] }, "references": { "reference_data": [ { "name": "106251", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106251" }, { "name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/", "refsource": "MISC", "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2018-20025", "datePublished": "2019-02-19T21:00:00Z", "dateReserved": "2018-12-10T00:00:00", "dateUpdated": "2024-09-16T18:39:11.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9013
Vulnerability from cvelistv5
Published
2019-08-15 16:08
Modified
2024-08-04 21:31
Severity ?
EPSS score ?
Summary
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.
References
▼ | URL | Tags |
---|---|---|
https://www.us-cert.gov/ics/advisories/icsa-19-213-04 | x_refsource_MISC | |
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download= | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:31:37.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-11T11:39:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04" }, { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=", "refsource": "CONFIRM", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9013", "datePublished": "2019-08-15T16:08:31", "dateReserved": "2019-02-22T00:00:00", "dateUpdated": "2024-08-04T21:31:37.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10612
Vulnerability from cvelistv5
Published
2019-01-29 16:00
Modified
2024-09-17 02:32
Severity ?
EPSS score ?
Summary
In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106248 | vdb-entry, x_refsource_BID | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
3S-Smart | 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0 |
Version: 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:46.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106248", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106248" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0", "vendor": "3S-Smart", "versions": [ { "status": "affected", "version": "3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0" } ] } ], "datePublic": "2018-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "IMPROPER ACCESS CONTROL CWE-284", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-30T10:57:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "name": "106248", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106248" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "DATE_PUBLIC": "2018-12-18T00:00:00", "ID": "CVE-2018-10612", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0", "version": { "version_data": [ { "version_value": "3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0" } ] } } ] }, "vendor_name": "3S-Smart" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER ACCESS CONTROL CWE-284" } ] } ] }, "references": { "reference_data": [ { "name": "106248", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106248" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2018-10612", "datePublished": "2019-01-29T16:00:00Z", "dateReserved": "2018-05-01T00:00:00", "dateUpdated": "2024-09-17T02:32:49.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4224
Vulnerability from cvelistv5
Published
2023-03-23 11:15
Modified
2024-08-03 01:34
Severity ?
EPSS score ?
Summary
In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | Control RTE (SL) |
Version: 3.0.0.0 < 3.5.19.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:49.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17553\u0026token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Control RTE (SL) ", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": " Runtime Toolkit ", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Safety SIL2 Runtime Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Safety SIL2 PSP", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "HMI (SL) ", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Development System V3", "vendor": "CODESYS", "versions": [ { "lessThan": "3.5.19.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": " Control for BeagleBone SL ", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": " Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": " Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "4.8.0.0", "status": "affected", "version": "3.0.0.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Franklin Zhao from ELEX FEIGONG RESEARCH INSTITUTE of Elex CyberSecurity" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Reid Wightman of Dragos" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In multiple products of CODESYS v3 in multiple versions a remote low privileged user\u0026nbsp;could utilize this vulnerability to read and modify system files and OS resources or DoS the device." } ], "value": "In multiple products of CODESYS v3 in multiple versions a remote low privileged user\u00a0could utilize this vulnerability to read and modify system files and OS resources or DoS the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-09T10:47:13.144Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17553\u0026token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d\u0026download=" } ], "source": { "defect": [ "CERT@VDE#64318" ], "discovery": "EXTERNAL" }, "title": "CODESYS: Exposure of Resource to Wrong Sphere in CODESYS V3", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-4224", "datePublished": "2023-03-23T11:15:37.014Z", "dateReserved": "2022-11-30T06:54:13.183Z", "dateUpdated": "2024-08-03T01:34:49.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22515
Vulnerability from cvelistv5
Published
2022-04-07 18:21
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Control RTE (SL) |
Version: V3 < V3.5.17.40 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Development System V3", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Embedded Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Remote Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.17.40", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for Beckhoff CX9020 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] }, { "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4", "versionType": "custom" } ] } ], "datePublic": "2022-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668 Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T07:45:29", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=" } ], "source": { "discovery": "UNKNOWN" }, "title": "A component of the CODESYS Control runtime system allows read and write access to configuration files", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-06-01T10:00:00.000Z", "ID": "CVE-2022-22515", "STATE": "PUBLIC", "TITLE": "A component of the CODESYS Control runtime system allows read and write access to configuration files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Control RTE (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Control RTE (for Beckhoff CX) SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Control Win (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Development System V3", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Control Runtime System Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Embedded Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Remote Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.17.40" } ] } }, { "product_name": "CODESYS Control for BeagleBone SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Beckhoff CX9020 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for emPC-A/iMX6 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for IOT2000 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Linux SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC100 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC200 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PLCnext SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Raspberry Pi SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for WAGO Touch Panels 600 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4", "version_value": "V4.5.0.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-668 Exposure of Resource to Wrong Sphere" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=", "refsource": "CONFIRM", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-22515", "datePublished": "2022-04-07T18:21:16.280553Z", "dateReserved": "2022-01-03T00:00:00", "dateUpdated": "2024-09-16T17:59:22.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22519
Vulnerability from cvelistv5
Published
2022-04-07 18:21
Modified
2024-09-17 03:22
Severity ?
EPSS score ?
Summary
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Control RTE (SL) |
Version: V3.5.18.0 < V3.5.18.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Embedded Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Remote Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Beckhoff CX9020 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T05:55:13", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=" } ], "source": { "discovery": "UNKNOWN" }, "title": "Special HTTP(s) Requests can cause a buffer-read causing a crash of the webserver and the runtime system.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-04-06T10:00:00.000Z", "ID": "CVE-2022-22519", "STATE": "PUBLIC", "TITLE": "Special HTTP(s) Requests can cause a buffer-read causing a crash of the webserver and the runtime system." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Control RTE (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control RTE (for Beckhoff CX) SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Win (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Runtime System Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Embedded Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Remote Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control for BeagleBone SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Beckhoff CX9020 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for emPC-A/iMX6 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for IOT2000 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Linux SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC100 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC200 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PLCnext SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Raspberry Pi SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for WAGO Touch Panels 600 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-126 Buffer Over-read" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=", "refsource": "MISC", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-22519", "datePublished": "2022-04-07T18:21:23.764420Z", "dateReserved": "2022-01-03T00:00:00", "dateUpdated": "2024-09-17T03:22:45.345Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22513
Vulnerability from cvelistv5
Published
2022-04-07 18:21
Modified
2024-09-17 04:29
Severity ?
EPSS score ?
Summary
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Control RTE (SL) |
Version: V3.5.18.0 < V3.5.18.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.460Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Gateway", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Windows", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Development System V3", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Embedded Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Remote Target Visu Toolkit", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.0", "status": "affected", "version": "V3.5.18.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Beckhoff CX9020 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] }, { "product": "CODESYS Edge Gateway for Linux", "vendor": "CODESYS", "versions": [ { "lessThan": "V4.5.0.0", "status": "affected", "version": "V4.5.0.0", "versionType": "custom" } ] } ], "datePublic": "2022-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-27T05:55:10", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "source": { "discovery": "UNKNOWN" }, "title": "Null Pointer Dereference in multiple CODESYS products can lead to a DoS.", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-04-06T10:00:00.000Z", "ID": "CVE-2022-22513", "STATE": "PUBLIC", "TITLE": "Null Pointer Dereference in multiple CODESYS products can lead to a DoS." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Control RTE (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control RTE (for Beckhoff CX) SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Win (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Gateway", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Development System V3", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control Runtime System Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Embedded Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Remote Target Visu Toolkit", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3.5.18.0", "version_value": "V3.5.18.0" } ] } }, { "product_name": "CODESYS Control for BeagleBone SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Beckhoff CX9020 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for emPC-A/iMX6 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for IOT2000 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Linux SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC100 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PFC200 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for PLCnext SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for Raspberry Pi SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Control for WAGO Touch Panels 600 SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } }, { "product_name": "CODESYS Edge Gateway for Linux", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V4.5.0.0", "version_value": "V4.5.0.0" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476 NULL Pointer Dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=", "refsource": "MISC", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-22513", "datePublished": "2022-04-07T18:21:12.792321Z", "dateReserved": "2022-01-03T00:00:00", "dateUpdated": "2024-09-17T04:29:14.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-20026
Vulnerability from cvelistv5
Published
2019-02-19 21:00
Modified
2024-09-16 20:37
Severity ?
EPSS score ?
Summary
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/106251 | vdb-entry, x_refsource_BID | |
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/ | x_refsource_MISC | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Kaspersky Lab | CODESYS V3 products |
Version: prior V3.5.14.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:51:18.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106251", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106251" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CODESYS V3 products", "vendor": "Kaspersky Lab", "versions": [ { "status": "affected", "version": "prior V3.5.14.0" } ] } ], "datePublic": "2018-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Communication Address Filtering", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-02T14:43:36", "orgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "shortName": "Kaspersky" }, "references": [ { "name": "106251", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106251" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnerability@kaspersky.com", "DATE_PUBLIC": "2018-12-19T00:00:00", "ID": "CVE-2018-20026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS V3 products", "version": { "version_data": [ { "version_value": "prior V3.5.14.0" } ] } } ] }, "vendor_name": "Kaspersky Lab" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Communication Address Filtering" } ] } ] }, "references": { "reference_data": [ { "name": "106251", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106251" }, { "name": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/", "refsource": "MISC", "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "e45d732a-8f6b-4b6b-be76-7420f6a2b988", "assignerShortName": "Kaspersky", "cveId": "CVE-2018-20026", "datePublished": "2019-02-19T21:00:00Z", "dateReserved": "2018-12-10T00:00:00", "dateUpdated": "2024-09-16T20:37:39.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31805
Vulnerability from cvelistv5
Published
2022-06-24 07:46
Modified
2024-09-16 18:55
Severity ?
EPSS score ?
Summary
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Development System |
Version: V2 < V2.3.9.69 Version: V3 < V3.5.18.30 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.086Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CODESYS Development System", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.3.9.69", "status": "affected", "version": "V2", "versionType": "custom" }, { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Gateway Client", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.3.9.38", "status": "affected", "version": "V2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Gateway Server", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.3.9.38", "status": "affected", "version": "V2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Web server", "vendor": "CODESYS", "versions": [ { "lessThan": "V1.1.9.23", "status": "affected", "version": "V1", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS SP Realtime NT", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.3.7.30", "status": "affected", "version": "V2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS PLCWinNT", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.4.7.57", "status": "affected", "version": "V2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Runtime Toolkit 32 bit full", "vendor": "CODESYS", "versions": [ { "lessThan": "V2.4.7.57", "status": "affected", "version": "V2", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Edge Gateway for Windows", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS OPC DA Server SL", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS PLCHandler", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "CODESYS Gateway", "vendor": "CODESYS", "versions": [ { "lessThan": "V3.5.18.30", "status": "affected", "version": "V3", "versionType": "custom" } ] } ], "datePublic": "2022-06-22T22:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.\u003c/p\u003e" } ], "value": "In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-523", "description": "CWE-523 Unprotected Transport of Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-09T12:54:39.506Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=" } ], "source": { "defect": [ "CERT@VDE#", "64140" ], "discovery": "UNKNOWN" }, "title": "Insecure transmission of credentials", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-06-23T10:00:00.000Z", "ID": "CVE-2022-31805", "STATE": "PUBLIC", "TITLE": "Insecure transmission of credentials" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CODESYS Development System", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.3.9.69" }, { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } }, { "product_name": "CODESYS Gateway Client", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.3.9.38" } ] } }, { "product_name": "CODESYS Gateway Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.3.9.38" } ] } }, { "product_name": "CODESYS Web server", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V1", "version_value": "V1.1.9.23" } ] } }, { "product_name": "CODESYS SP Realtime NT", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.3.7.30" } ] } }, { "product_name": "CODESYS PLCWinNT", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.4.7.57" } ] } }, { "product_name": "CODESYS Runtime Toolkit 32 bit full", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V2", "version_value": "V2.4.7.57" } ] } }, { "product_name": "CODESYS Edge Gateway for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } }, { "product_name": "CODESYS HMI (SL)", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } }, { "product_name": "CODESYS OPC DA Server SL", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } }, { "product_name": "CODESYS PLCHandler", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } }, { "product_name": "CODESYS Gateway", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "V3", "version_value": "V3.5.18.20" } ] } } ] }, "vendor_name": "CODESYS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-523 Unprotected Transport of Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=", "refsource": "CONFIRM", "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=" } ] }, "source": { "defect": [ "CERT@VDE#", "64140" ], "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-31805", "datePublished": "2022-06-24T07:46:15.076016Z", "dateReserved": "2022-05-30T00:00:00", "dateUpdated": "2024-09-16T18:55:26.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4046
Vulnerability from cvelistv5
Published
2023-08-03 12:39
Modified
2024-10-22 19:44
Severity ?
EPSS score ?
Summary
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | CODESYS Control for BeagleBone SL |
Version: all |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:27:54.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-025/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-4046", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-22T19:43:34.142141Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-22T19:44:02.247Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "CODESYS Control for BeagleBone SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for emPC-A/iMX6 SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for IOT2000 SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for Linux SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for PFC100 SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for PFC200 SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for PLCnext SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for Raspberry Pi SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control for WAGO Touch Panels 600 SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control RTE (for Beckhoff CX) SL", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control RTE (SL)", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control Runtime System Toolkit", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS Control Win (SL)", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] }, { "defaultStatus": "affected", "product": "CODESYS HMI (SL)", "vendor": "CODESYS", "versions": [ { "status": "affected", "version": "all" } ] } ], "datePublic": "2023-08-03T10:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device." } ], "value": "In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-03T12:39:44.002Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-025/" } ], "source": { "defect": [ "CERT@VDE#64299" ], "discovery": "EXTERNAL" }, "title": "CODESYS: Improper memory restrictions fro CODESYS Control", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-4046", "datePublished": "2023-08-03T12:39:44.002Z", "dateReserved": "2022-11-17T07:07:09.714Z", "dateUpdated": "2024-10-22T19:44:02.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-04-07 19:15
Modified
2024-11-21 06:46
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Summary
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_beckhoff_cx9020 | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | edge_gateway | * | |
codesys | edge_gateway | * | |
codesys | embedded_target_visu_toolkit | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | remote_target_visu_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "25737EE6-531E-4241-AA40-856388A2E333", "versionEndExcluding": "3.5.18.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*", "matchCriteriaId": "780B6607-72A7-487E-A180-5C9A49BF6355", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E36291AE-21CB-4ECB-8816-D50712C70E30", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C264A88-C41C-400B-9C69-0DBB1CEB9DF9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash." }, { "lang": "es", "value": "Un atacante remoto autentificado puede obtener acceso a un puntero desreferenciado contenido en una solicitud. Los accesos pueden llevar posteriormente a la sobreescritura local de la memoria en el CmpTraceMgr, por lo que el atacante no puede obtener los valores le\u00eddos internamente ni controlar los valores a escribir. Si se accede a una memoria no v\u00e1lida, se produce un fallo" } ], "id": "CVE-2022-22514", "lastModified": "2024-11-21T06:46:56.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-07T19:15:08.133", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-822" } ], "source": "info@cert.vde.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-07 19:15
Modified
2024-11-21 06:46
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17094&token=2fb188e2213c74194e81ba61ff99f1c68602ba4d&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17094&token=2fb188e2213c74194e81ba61ff99f1c68602ba4d&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_beckhoff_cx9020 | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | embedded_target_visu_toolkit | * | |
codesys | hmi_sl | * | |
codesys | remote_target_visu_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A7A44B8-BAC7-47B6-ACDC-015DF54D36BF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system." }, { "lang": "es", "value": "Un atacante remoto y no autenticado puede enviar una solicitud HTTP o HTTPS con un dise\u00f1o espec\u00edfico que provoque una sobrelectura del b\u00fafer y provoque un bloqueo del servidor web del sistema de ejecuci\u00f3n de CODESYS Control" } ], "id": "CVE-2022-22519", "lastModified": "2024-11-21T06:46:56.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-07T19:15:08.417", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17094\u0026token=2fb188e2213c74194e81ba61ff99f1c68602ba4d\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-126" } ], "source": "info@cert.vde.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-24 08:15
Modified
2024-11-21 07:05
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | development_system | * | |
codesys | edge_gateway | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | opc_server | * | |
codesys | plchandler | * | |
codesys | plcwinnt | * | |
codesys | runtime_toolkit | * | |
codesys | sp_realtime_nt | * | |
codesys | web_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "85D06342-38A2-4E95-BE56-08D54271E41F", "versionEndExcluding": "2.3.9.69", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*", "matchCriteriaId": "EC5C6832-F0B3-46DF-8047-22A2544D937C", "versionEndExcluding": "3.5.18.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B9AE405-A0E5-48FF-9E8C-1A323D296445", "versionEndExcluding": "2.3.9.38", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F23A1B9F-97EE-4E4C-AAB9-511B4A3ED98C", "versionEndExcluding": "3.5.18.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:opc_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "46CDFB44-9702-4978-B577-9D07DF3D04B0", "versionEndExcluding": "3.5.18.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:plchandler:*:*:*:*:*:*:*:*", "matchCriteriaId": "4932F620-43F8-4F3F-80AE-CD603BF05962", "versionEndExcluding": "3.5.18.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*", "matchCriteriaId": "6887DEB0-5C13-4D7B-86E6-504D8CBB2A0D", "versionEndExcluding": "2.4.7.57", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*", "matchCriteriaId": "5A605019-68F5-4C21-96BD-C300DECAA3D8", "versionEndExcluding": "2.4.7.57", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:sp_realtime_nt:*:*:*:*:*:*:*:*", "matchCriteriaId": "14F1D049-7DF2-453A-9D5A-7FCBCAD465E3", "versionEndExcluding": "2.3.7.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:web_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "971AF379-F2B6-4791-B153-718517CA3E62", "versionEndExcluding": "1.1.9.23", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected." }, { "lang": "es", "value": "En CODESYS Development System, varios componentes en diversos versiones transmiten las contrase\u00f1as para la comunicaci\u00f3n entre clientes y servidores sin protecci\u00f3n" } ], "id": "CVE-2022-31805", "lastModified": "2024-11-21T07:05:22.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2022-06-24T08:15:07.590", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17140\u0026token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-523" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-07 19:15
Modified
2024-11-21 06:46
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_beckhoff_cx9020 | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | edge_gateway | * | |
codesys | edge_gateway | * | |
codesys | embedded_target_visu_toolkit | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | remote_target_visu_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A7A44B8-BAC7-47B6-ACDC-015DF54D36BF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*", "matchCriteriaId": "780B6607-72A7-487E-A180-5C9A49BF6355", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E36291AE-21CB-4ECB-8816-D50712C70E30", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C264A88-C41C-400B-9C69-0DBB1CEB9DF9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash." }, { "lang": "es", "value": "Un atacante remoto autenticado puede causar una desreferencia de puntero null en el componente CmpSettings de los productos CODESYS afectados, lo que conlleva a un bloqueo" } ], "id": "CVE-2022-22513", "lastModified": "2024-11-21T06:46:55.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-07T19:15:08.073", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17093\u0026token=15cd8424832ea10dcd4873a409a09a539ee381ca\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-07 19:15
Modified
2024-11-21 06:46
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Summary
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17089&token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17089&token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_beckhoff_cx9020 | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | embedded_target_visu_toolkit | * | |
codesys | hmi_sl | * | |
codesys | remote_target_visu_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "25737EE6-531E-4241-AA40-856388A2E333", "versionEndExcluding": "3.5.18.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products." }, { "lang": "es", "value": "Un atacante remoto y autentificado podr\u00eda utilizar el programa de control del sistema de tiempo de ejecuci\u00f3n CODESYS Control para utilizar la vulnerabilidad con el fin de leer y modificar el/los archivo/s de configuraci\u00f3n de los productos afectados" } ], "id": "CVE-2022-22515", "lastModified": "2024-11-21T06:46:56.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2022-04-07T19:15:08.187", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17089\u0026token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-19 21:29
Modified
2024-11-21 04:00
Severity ?
Summary
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
References
▼ | URL | Tags | |
---|---|---|---|
vulnerability@kaspersky.com | http://www.securityfocus.com/bid/106251 | Third Party Advisory, VDB Entry | |
vulnerability@kaspersky.com | https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/ | Mitigation, Third Party Advisory | |
vulnerability@kaspersky.com | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106251 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | safety_sil2 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E5A50D-470A-4C7D-A634-E97AE95B38B5", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "455BEF47-4D2A-4314-AF1D-C5C46236B135", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E52640-4AA9-40C1-A00E-374334F761C7", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C87347FA-38EA-4299-A822-63FCF0E34577", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D3E05BC-83BC-49C8-91AD-64A1EE9D36BD", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D2875A-E1DF-4C7D-9DD7-7BE8D617EF3C", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE9699B0-CCE3-42AB-8208-492382D59582", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CFD36A-208D-444C-A3C3-C2B11CAF65AC", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "6368AFD2-D0F4-4E93-9D28-00D2DAF6F1BD", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E623E98-8040-43D2-81B5-D6B06B374472", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA6D880C-195D-4830-B0B5-7D7BC32182B4", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "087FE9CF-7492-416A-9585-0E8C00ABB320", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "498AB0A1-C9F2-40A5-BC72-9CC4F96D74DE", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "63F51840-0A93-43BD-B8D0-145C7C52C7B0", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0A629A-E3CE-428A-81C1-25965A681B73", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0." }, { "lang": "es", "value": "Existen valores aleatorios utilizados de manera insuficiente en los productos de CODESYS, en sus versiones V3 anteriores a la V3.5.14.0." } ], "id": "CVE-2018-20025", "lastModified": "2024-11-21T04:00:46.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-19T21:29:00.243", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106251" }, { "source": "vulnerability@kaspersky.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/" }, { "source": "vulnerability@kaspersky.com", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-037-codesys-control-v3-use-of-insufficiently-random-values/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-29 16:29
Modified
2024-11-21 03:41
Severity ?
Summary
In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/106248 | Third Party Advisory, VDB Entry | |
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106248 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_runtime_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system_v3 | * | |
codesys | hmi_sl | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E5A50D-470A-4C7D-A634-E97AE95B38B5", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "455BEF47-4D2A-4314-AF1D-C5C46236B135", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E52640-4AA9-40C1-A00E-374334F761C7", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C87347FA-38EA-4299-A822-63FCF0E34577", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D3E05BC-83BC-49C8-91AD-64A1EE9D36BD", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D2875A-E1DF-4C7D-9DD7-7BE8D617EF3C", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE9699B0-CCE3-42AB-8208-492382D59582", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CFD36A-208D-444C-A3C3-C2B11CAF65AC", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E623E98-8040-43D2-81B5-D6B06B374472", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA6D880C-195D-4830-B0B5-7D7BC32182B4", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F359B4-0530-47A3-BFBB-BA7D32104919", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "63F51840-0A93-43BD-B8D0-145C7C52C7B0", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials." }, { "lang": "es", "value": "En los productos CODESYS Control V3, de 3S-Smart Software Solutions GmbH, en versiones anteriores a la 3.5.14.0, la gesti\u00f3n de accesos de usuarios y el cifrado de las comunicaciones no est\u00e1 habilitado por defecto, lo que podr\u00eda permitir que un atacante acceda al dispositivo y a su informaci\u00f3n sensible, incluyendo las credenciales de usuario." } ], "id": "CVE-2018-10612", "lastModified": "2024-11-21T03:41:39.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-29T16:29:00.247", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106248" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106248" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-311" }, { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-23 12:15
Modified
2024-11-21 07:34
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | hmi_sl | * | |
codesys | runtime_toolkit | * | |
codesys | safety_sil2 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "40CAED29-E204-459D-8AFC-F814E68FAB9A", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9691E-E67A-4D59-9152-3731DD381CF4", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5FC8BEB-DB37-4486-BAFD-16B82F331F9C", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2821B72-748A-4B3E-BD8B-E55C92A1A166", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "680C2604-3774-43D2-9DDE-38A0F593BFF3", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4B2CB47-68F3-4C17-8D61-88F655CF19ED", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3514C8-F513-4576-8F6D-DDB193E3B947", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5059640A-05F0-4D59-9682-BC09F155527C", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7D13CFF-F753-430B-9E03-F3F24066B529", "versionEndExcluding": "4.8.0.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C27B4D20-FDE3-4003-97BD-F43EE147AD6A", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "63A8AFF5-3CC8-43FA-A9D3-A6A53FAF15FC", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1A44FED-CFBB-454A-B8E8-FC11A996488F", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "8297903A-80E1-4FA7-B552-672B94B6B6B4", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C60464-F6BB-431A-AD96-32B07FD99948", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "0032B82B-21B9-4006-A7E4-CD5B92962136", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7181873-775F-43A6-BDBB-DBB2879C7D4D", "versionEndExcluding": "3.5.19.0", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple products of CODESYS v3 in multiple versions a remote low privileged user\u00a0could utilize this vulnerability to read and modify system files and OS resources or DoS the device." } ], "id": "CVE-2022-4224", "lastModified": "2024-11-21T07:34:49.520", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-23T12:15:12.990", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17553\u0026token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17553\u0026token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "info@cert.vde.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-07 19:15
Modified
2024-11-21 06:46
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17091&token=c450f8bbbd838c647d102f359356386c6ea5aeca&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17091&token=c450f8bbbd838c647d102f359356386c6ea5aeca&download= | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_beckhoff_cx9020 | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | edge_gateway | * | |
codesys | edge_gateway | * | |
codesys | embedded_target_visu_toolkit | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | remote_target_visu_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "25737EE6-531E-4241-AA40-856388A2E333", "versionEndExcluding": "3.5.18.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*", "matchCriteriaId": "780B6607-72A7-487E-A180-5C9A49BF6355", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E36291AE-21CB-4ECB-8816-D50712C70E30", "versionEndExcluding": "4.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C264A88-C41C-400B-9C69-0DBB1CEB9DF9", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed." }, { "lang": "es", "value": "Un atacante remoto no autenticado puede interrumpir los canales de comunicaci\u00f3n presentes entre los productos CODESYS al adivinar un ID de canal v\u00e1lido e inyectando paquetes. Esto hace que el canal de comunicaci\u00f3n sea cerrado" } ], "id": "CVE-2022-22517", "lastModified": "2024-11-21T06:46:56.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-07T19:15:08.300", "references": [ { "source": "info@cert.vde.com", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17091\u0026token=c450f8bbbd838c647d102f359356386c6ea5aeca\u0026download=" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-334" } ], "source": "info@cert.vde.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-03 13:15
Modified
2024-11-21 07:34
Severity ?
Summary
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-025/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-025/ | Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_plcnext_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_for_wago_touch_panels_600_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_system_toolkit | * | |
codesys | control_win_sl | * | |
codesys | hmi_sl | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "2390BDA5-FC7C-43F2-A6D0-098DE49E8092", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "07DC0FD5-57BB-41CD-9FFD-36FEC5573BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE2276F0-8EF2-4CEA-9A75-010D31F8D76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB41ACE5-0064-4BBC-AEF7-2A89D21EEA83", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D23780DF-5CF3-4D88-83A4-D5D0E6BF7274", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CAF552D-E704-4979-9335-6290F11D6EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "31A0FF97-A6E5-4339-B68A-E1F76A24D50E", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC1C54A7-686C-433C-91B0-B84720ABFC81", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1B0A7F9-9F70-4217-AF38-14E9F9F7CDDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2102923-8711-4D2C-BF3E-870AC1D8F2AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "98918E65-854F-4719-8419-79578C5F9EAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "07750392-D8FF-413D-82F9-55B9F2F12B55", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE76A4D8-070C-45D7-AF3B-12FFD6BD73E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "23B980AB-A690-43C0-A117-929C4AD7A2DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device." } ], "id": "CVE-2022-4046", "lastModified": "2024-11-21T07:34:30.347", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-08-03T13:15:09.627", "references": [ { "source": "info@cert.vde.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-025/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-025/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-15 17:15
Modified
2024-11-21 04:50
Severity ?
Summary
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download= | Vendor Advisory | |
cve@mitre.org | https://www.us-cert.gov/ics/advisories/icsa-19-213-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download= | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-19-213-04 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_win_sl | * | |
codesys | development_system | * | |
codesys | hmi_sl | * | |
codesys | raspberry_pi | * | |
codesys | runtime_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "039F6952-A4B8-4DFE-A66A-BFDED2613EA1", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F49287B-562F-4439-BFFC-AEFD2E338FDE", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "19D75972-D10B-42E2-B745-40D116EE0F55", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A58A411-9A42-487C-85CE-EAD39D9BD0A4", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "83B749C0-A553-42AB-AFCF-91F990BAA765", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C13DE019-B415-4373-8FC2-54A2898F50EA", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7A46E2C-E90A-462B-BA73-1D67BC558C28", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "992A4A8B-C289-43AF-B3CC-EAE75FB4DD35", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A788394-1FB1-49A3-9C48-C91F190B5B16", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "00A0327E-0FD9-403B-A5F5-6C3D496FF53F", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:raspberry_pi:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CA348F5-4B88-487E-A2B6-F600FAFDAD19", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "40EE54FB-B551-431D-B469-DCEB42BE8132", "versionEndExcluding": "3.5.16.0", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3." }, { "lang": "es", "value": "Se detect\u00f3 un problema en los productos 3S-Smart CODESYS V3. La aplicaci\u00f3n puede utilizar cifrado no basado en TLS, lo que resulta en que las credenciales de usuario no est\u00e9n suficientemente protegidas durante el transporte. Todas las variantes de los siguientes productos CODESYS V3 en todas las versiones que contienen el componente CmpUserMgr est\u00e1n afectadas indiferentemente del tipo de CPU o sistema operativo: CODESYS Control para BeagleBone, CODESYS Control para emPC-A/iMX6, CODESYS Control para IOT2000, CODESYS Control para Linux, CODESYS Control para PFC100, CODESYS Control para PFC200, CODESYS Control para Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (para Beckhoff CX), CODESYS Control Win V3 (tambi\u00e9n parte de la configuraci\u00f3n de CODESYS Development System), CODESYS V3 Simulation Runtime (parte del CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3." } ], "id": "CVE-2019-9013", "lastModified": "2024-11-21T04:50:48.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-15T17:15:13.660", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=12943\u0026token=d097958a67ba382de688916f77e3013c0802fade\u0026download=" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-02-19 21:29
Modified
2024-11-21 04:00
Severity ?
Summary
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
References
▼ | URL | Tags | |
---|---|---|---|
vulnerability@kaspersky.com | http://www.securityfocus.com/bid/106251 | Broken Link, Third Party Advisory, VDB Entry | |
vulnerability@kaspersky.com | https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/ | Mitigation, Third Party Advisory | |
vulnerability@kaspersky.com | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106251 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone_sl | * | |
codesys | control_for_empc-a\/imx6_sl | * | |
codesys | control_for_iot2000_sl | * | |
codesys | control_for_linux_sl | * | |
codesys | control_for_pfc100_sl | * | |
codesys | control_for_pfc200_sl | * | |
codesys | control_for_raspberry_pi_sl | * | |
codesys | control_rte_sl | * | |
codesys | control_rte_sl_\(for_beckhoff_cx\) | * | |
codesys | control_runtime_toolkit | * | |
codesys | control_win_sl | * | |
codesys | development_system_v3 | * | |
codesys | gateway | * | |
codesys | hmi_sl | * | |
codesys | opc_server | * | |
codesys | plchandler | * | |
codesys | safety_sil2 | * | |
codesys | targetvisu_sl | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E5A50D-470A-4C7D-A634-E97AE95B38B5", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "455BEF47-4D2A-4314-AF1D-C5C46236B135", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E52640-4AA9-40C1-A00E-374334F761C7", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "C87347FA-38EA-4299-A822-63FCF0E34577", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D3E05BC-83BC-49C8-91AD-64A1EE9D36BD", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D2875A-E1DF-4C7D-9DD7-7BE8D617EF3C", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE9699B0-CCE3-42AB-8208-492382D59582", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "20CFD36A-208D-444C-A3C3-C2B11CAF65AC", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "matchCriteriaId": "6368AFD2-D0F4-4E93-9D28-00D2DAF6F1BD", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E623E98-8040-43D2-81B5-D6B06B374472", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA6D880C-195D-4830-B0B5-7D7BC32182B4", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*", "matchCriteriaId": "00F359B4-0530-47A3-BFBB-BA7D32104919", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "498AB0A1-C9F2-40A5-BC72-9CC4F96D74DE", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "63F51840-0A93-43BD-B8D0-145C7C52C7B0", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:opc_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3A3A591-9B7A-4328-93C8-728D3E3E045D", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:plchandler:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7E0C96B-5FD4-422A-B429-860192BC46A0", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C0A629A-E3CE-428A-81C1-25965A681B73", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:targetvisu_sl:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA2E1543-D82B-4BE7-8C9C-4EAABFB1F68B", "versionEndExcluding": "3.5.14.0", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0." }, { "lang": "es", "value": "Existe el filtrado de direcciones de comunicaci\u00f3n incorrecto en los productos de CODESYS, en sus versiones V3 anteriores a la V3.5.14.0." } ], "id": "CVE-2018-20026", "lastModified": "2024-11-21T04:00:47.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-19T21:29:00.290", "references": [ { "source": "vulnerability@kaspersky.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106251" }, { "source": "vulnerability@kaspersky.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/" }, { "source": "vulnerability@kaspersky.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04" } ], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }