Product:

Control_for_wago_touch_panels_600_sl

(Codesys)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 42
Date Id Summary Products Score Patch Annotated
2022-04-07 CVE-2022-22517 An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed. Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit 7.5
2021-05-03 CVE-2021-29242 CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte, Control_runtime_system_toolkit, Control_win, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Opc_server, Plchandler, Remote_target_visu_toolkit, Safety_sil, Simulation_runtime 7.3