2023-03-23
|
CVE-2018-25048
|
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_v3_runtime_system_toolkit, Control_win, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit, Runtime_plcwinnt, Runtime_system_toolkit, Simulation_runtime
|
8.8
|
|
|
2022-07-11
|
CVE-2022-30791
|
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Remote_target_visu_toolkit
|
7.5
|
|
|
2022-07-11
|
CVE-2022-30792
|
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Remote_target_visu_toolkit
|
7.5
|
|
|
2022-04-07
|
CVE-2022-22515
|
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Embedded_target_visu_toolkit, Hmi_sl, Remote_target_visu_toolkit
|
8.1
|
|
|
2022-04-07
|
CVE-2022-22513
|
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
6.5
|
|
|
2022-04-07
|
CVE-2022-22514
|
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
7.1
|
|
|
2022-04-07
|
CVE-2022-22519
|
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Embedded_target_visu_toolkit, Hmi_sl, Remote_target_visu_toolkit
|
7.5
|
|
|
2022-04-07
|
CVE-2022-22517
|
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
|
Control_for_beaglebone_sl, Control_for_beckhoff_cx9020, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_system_toolkit, Control_win_sl, Development_system, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi_sl, Remote_target_visu_toolkit
|
7.5
|
|
|
2019-09-13
|
CVE-2019-13548
|
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.
|
Control_for_beaglebone, Control_for_empc\-A\/imx6, Control_for_iot2000, Control_for_linux, Control_for_pfc100, Control_for_pfc200, Control_for_raspberry_pi, Control_rte, Control_runtime_system_toolkit, Control_win, Embedded_target_visu_toolkit, Hmi, Remote_target_visu_toolkit
|
9.8
|
|
|
2021-05-03
|
CVE-2021-29242
|
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
|
Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte, Control_runtime_system_toolkit, Control_win, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Opc_server, Plchandler, Remote_target_visu_toolkit, Safety_sil, Simulation_runtime
|
7.3
|
|
|