First published: Fri Sep 13 2019(Updated: )
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone | <3.5.14.10 | |
Codesys Control For Empc-a\/imx6 | <3.5.14.10 | |
Codesys Control For Iot2000 | <3.5.14.10 | |
Codesys Control For Linux | <3.5.14.10 | |
Codesys Control For Pfc100 | <3.5.14.10 | |
Codesys Control For Pfc200 | <3.5.14.10 | |
Codesys Control For Raspberry Pi | <3.5.14.10 | |
Codesys Control Rte | >=3.5.8.60<3.5.12.80 | |
Codesys Control Rte | >=3.5.13.0<3.5.14.10 | |
Codesys Control Runtime System Toolkit | >=3.0<3.5.12.80 | |
Codesys Control Win | >=3.5.9.80<=3.5.12.80 | |
Codesys Control Win | >=3.5.13.0<3.5.14.10 | |
Codesys Embedded Target Visu Toolkit | >=3.0<3.5.12.80 | |
Codesys Hmi | >=3.5.10.0<3.5.12.80 | |
Codesys Hmi | >=3.5.13.0<3.5.14.10 | |
Codesys Remote Target Visu Toolkit | >=3.0<3.5.12.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this CODESYS vulnerability is CVE-2019-13532.
CVE-2019-13532 has a severity rating of 7.5 (High).
All versions of CODESYS prior to 3.5.14.10 are affected by CVE-2019-13532.
CVE-2019-13532 allows an attacker to send specially crafted HTTP or HTTPS requests which may allow access to files outside the restricted working directory of the controller.
Yes, upgrading to CODESYS version 3.5.14.10 or above fixes CVE-2019-13532.