Product:

Opc_server

(Codesys)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2021-05-03 CVE-2021-29242 CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_arm_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_plcnext_sl, Control_for_raspberry_pi_sl, Control_for_wago_touch_panels_600_sl, Control_rte, Control_runtime_system_toolkit, Control_win, Edge_gateway, Embedded_target_visu_toolkit, Gateway, Hmi, Opc_server, Plchandler, Remote_target_visu_toolkit, Safety_sil, Simulation_runtime 7.3
2022-06-24 CVE-2022-31805 In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. Development_system, Edge_gateway, Gateway, Hmi_sl, Opc_server, Plchandler, Plcwinnt, Runtime_toolkit, Sp_realtime_nt, Web_server N/A
2019-02-19 CVE-2018-20026 Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0. Control_for_beaglebone_sl, Control_for_empc\-A\/imx6_sl, Control_for_iot2000_sl, Control_for_linux_sl, Control_for_pfc100_sl, Control_for_pfc200_sl, Control_for_raspberry_pi_sl, Control_rte_sl, Control_rte_sl_\(For_beckhoff_cx\), Control_runtime_toolkit, Control_win_sl, Development_system_v3, Gateway, Hmi_sl, Opc_server, Plchandler, Safety_sil2, Targetvisu_sl 7.5