2020-01-24
|
CVE-2020-7052
|
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_linux, Control_for_pfc100, Control_for_pfc200, Control_for_plcnext, Control_for_raspberry_pi, Control_rte, Control_runtime_system_toolkit, Control_win, Gateway, Hmi, Safety_sil2, Simulation_runtime
|
6.5
|
|
|
2020-07-22
|
CVE-2020-15806
|
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_linux, Control_for_pfc100, Control_for_pfc200, Control_for_plcnext, Control_for_raspberry_pi, Control_for_wago_touch_panels_600, Control_rte, Control_runtime_system_toolkit, Control_win, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit, Simulation_runtime
|
7.5
|
|
|
2021-05-03
|
CVE-2021-29241
|
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).
|
Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_raspberry_pi_sl, Control_runtime_system_toolkit, Development_system, Edge_gateway, Gateway
|
7.5
|
|
|
2021-05-03
|
CVE-2021-29242
|
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
|
Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte, Control_runtime_system_toolkit, Control_win, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Opc_server, Plchandler, Remote_target_visu_toolkit, Safety_sil, Simulation_runtime
|
7.3
|
|
|
2021-08-03
|
CVE-2021-33485
|
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.
|
Control, Control_rte, Control_runtime_system_toolkit, Control_win_sl, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit
|
9.8
|
|
|
2021-08-03
|
CVE-2021-36763
|
In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.
|
Control, Control_rte, Control_runtime_system_toolkit, Control_win_sl, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit
|
7.5
|
|
|
2022-04-07
|
CVE-2022-22513
|
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
6.5
|
|
|
2022-04-07
|
CVE-2022-22514
|
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
7.1
|
|
|
2022-04-07
|
CVE-2022-22515
|
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Embedded_target_visu_toolkit, Hmi_sl, Remote_target_visu_toolkit
|
N/A
|
|
|
2022-04-07
|
CVE-2022-22517
|
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
7.5
|
|
|