#VU85953 Stack-based buffer overflow in CODESYS products - CVE-2022-47386

 

#VU85953 Stack-based buffer overflow in CODESYS products - CVE-2022-47386

Published: January 31, 2024


Vulnerability identifier: #VU85953
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2022-47386
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
CODESYS Control RTE
CODESYS Control RTE (for Beckhoff CX)
CODESYS Control Win
CODESYS Control Runtime System Toolkit
CODESYS Safety SIL2 Runtime Toolkit
CODESYS Safety SIL2 PSP
CODESYS HMI
CODESYS Development System V3
CODESYS Control for BeagleBone SL
CODESYS Control for emPC-A/iMX6 SL
CODESYS Control for IOT2000 SL
CODESYS Control for Linux SL
CODESYS Control for PFC100 SL
CODESYS Control for PFC200 SL
CODESYS Control for PLCnext SL
CODESYS Control for Raspberry Pi SL
CODESYS Control for WAGO Touch Panels 600 SL
Software vendor:
CODESYS

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the CmpTraceMgr component. A remote user can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links