Multiple vulnerabilities in CODESYS products



Risk Medium
Patch available YES
Number of vulnerabilities 15
CVE-ID CVE-2022-47378
CVE-2022-47393
CVE-2022-47392
CVE-2022-47385
CVE-2022-47390
CVE-2022-47389
CVE-2022-47388
CVE-2022-47387
CVE-2022-47386
CVE-2022-47384
CVE-2022-47383
CVE-2022-47382
CVE-2022-47381
CVE-2022-47380
CVE-2022-47379
CWE-ID CWE-20
CWE-822
CWE-121
CWE-787
Exploitation vector Network
Public exploit N/A
Vulnerable software
CODESYS Control RTE
Client/Desktop applications / Other client software

CODESYS Control RTE (for Beckhoff CX)
Client/Desktop applications / Other client software

CODESYS Control Win
Client/Desktop applications / Other client software

CODESYS Control Runtime System Toolkit
Client/Desktop applications / Other client software

CODESYS Safety SIL2 Runtime Toolkit
Client/Desktop applications / Other client software

CODESYS Safety SIL2 PSP
Client/Desktop applications / Other client software

CODESYS HMI
Client/Desktop applications / Other client software

CODESYS Development System V3
Client/Desktop applications / Other client software

CODESYS Control for BeagleBone SL
Client/Desktop applications / Other client software

CODESYS Control for emPC-A/iMX6 SL
Client/Desktop applications / Other client software

CODESYS Control for IOT2000 SL
Client/Desktop applications / Other client software

CODESYS Control for Linux SL
Client/Desktop applications / Other client software

CODESYS Control for PFC100 SL
Client/Desktop applications / Other client software

CODESYS Control for PFC200 SL
Client/Desktop applications / Other client software

CODESYS Control for PLCnext SL
Client/Desktop applications / Other client software

CODESYS Control for Raspberry Pi SL
Client/Desktop applications / Other client software

CODESYS Control for WAGO Touch Panels 600 SL
Client/Desktop applications / Other client software

Vendor CODESYS

Security Bulletin

This security bulletin contains information about 15 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU85945

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47378

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the CmpFiletransfer component. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Untrusted Pointer Dereference

EUVDB-ID: #VU85960

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47393

CWE-ID: CWE-822 - Untrusted Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to untrusted pointer dereference in the CmpFiletransfer component . A remote usercan send a specially crafted request and cause a denial of service condition on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU85959

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47392

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the CmpApp/CmpAppBP/CmpAppForce components. A remote user can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Stack-based buffer overflow

EUVDB-ID: #VU85958

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47385

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpAppForce component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Stack-based buffer overflow

EUVDB-ID: #VU85957

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47390

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Stack-based buffer overflow

EUVDB-ID: #VU85956

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47389

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Stack-based buffer overflow

EUVDB-ID: #VU85955

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47388

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Stack-based buffer overflow

EUVDB-ID: #VU85954

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47387

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Stack-based buffer overflow

EUVDB-ID: #VU85953

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47386

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Stack-based buffer overflow

EUVDB-ID: #VU85952

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47384

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Stack-based buffer overflow

EUVDB-ID: #VU85951

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47383

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Stack-based buffer overflow

EUVDB-ID: #VU85949

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47382

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Stack-based buffer overflow

EUVDB-ID: #VU85948

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47381

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpApp component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Stack-based buffer overflow

EUVDB-ID: #VU85947

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47380

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpApp component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Out-of-bounds write

EUVDB-ID: #VU85946

Risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-47379

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the CmpApp component. A remote user can trigger an out-of-bounds write and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

CODESYS Control RTE: All versions

CODESYS Control RTE (for Beckhoff CX): All versions

CODESYS Control Win: All versions

CODESYS Control Runtime System Toolkit: All versions

CODESYS Safety SIL2 Runtime Toolkit: All versions

CODESYS Safety SIL2 PSP: All versions

CODESYS HMI: All versions

CODESYS Development System V3: All versions

CODESYS Control for BeagleBone SL: All versions

CODESYS Control for emPC-A/iMX6 SL: All versions

CODESYS Control for IOT2000 SL: All versions

CODESYS Control for Linux SL: All versions

CODESYS Control for PFC100 SL: All versions

CODESYS Control for PFC200 SL: All versions

CODESYS Control for PLCnext SL: All versions

CODESYS Control for Raspberry Pi SL: All versions

CODESYS Control for WAGO Touch Panels 600 SL: All versions

CPE2.3 External links

https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###