2022-12-26
|
CVE-2020-12069
|
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_linux, Control_for_pfc100, Control_for_pfc200, Control_for_plcnext, Control_for_raspberry_pi, Control_rte_v3, Control_v3_runtime_system_toolkit, Control_win_v3, Hmi_v3, V3_simulation_runtime, Controller_cecc\-D_firmware, Controller_cecc\-Lk_firmware, Controller_cecc\-S_firmware, Pmc, 750\-8100_firmware, 750\-8101_firmware, 750\-8102_firmware, 750\-8202_firmware, 750\-8203_firmware, 750\-8204_firmware, 750\-8206_firmware, 750\-8207_firmware, 750\-8210_firmware, 750\-8211_firmware, 750\-8212_firmware, 750\-8213_firmware, 750\-8214_firmware, 750\-8215_firmware, 750\-8216_firmware, 750\-8217_firmware, 752\-8303\/8000\-0002_firmware, 762\-4201\/8000\-001_firmware, 762\-4202\/8000\-001_firmware, 762\-4203\/8000\-001_firmware, 762\-4204\/8000\-001_firmware, 762\-4205\/8000\-001_firmware, 762\-4205\/8000\-002_firmware, 762\-4206\/8000\-001_firmware, 762\-4206\/8000\-002_firmware, 762\-4301\/8000\-002_firmware, 762\-4302\/8000\-002_firmware, 762\-4303\/8000\-002_firmware, 762\-4304\/8000\-002_firmware, 762\-4305\/8000\-002_firmware, 762\-4306\/8000\-002_firmware, 762\-5203\/8000\-001_firmware, 762\-5204\/8000\-001_firmware, 762\-5205\/8000\-001_firmware, 762\-5206\/8000\-001_firmware, 762\-5303\/8000\-002_firmware, 762\-5304\/8000\-002_firmware, 762\-5305\/8000\-002_firmware, 762\-5306\/8000\-002_firmware, 762\-6201\/8000\-001_firmware, 762\-6202\/8000\-001_firmware, 762\-6203\/8000\-001_firmware, 762\-6204\/8000\-001_firmware, 762\-6301\/8000\-002_firmware, 762\-6302\/8000\-002_firmware, 762\-6303\/8000\-002_firmware, 762\-6304\/8000\-002_firmware
|
7.8
|
|
|
2023-03-23
|
CVE-2018-25048
|
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_v3_runtime_system_toolkit, Control_win, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit, Runtime_plcwinnt, Runtime_system_toolkit, Simulation_runtime
|
8.8
|
|
|
2019-09-17
|
CVE-2019-9008
|
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_win, Hmi, Simulation_runtime
|
8.8
|
|
|
2022-07-11
|
CVE-2022-30791
|
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Remote_target_visu_toolkit
|
7.5
|
|
|