First published: Fri Sep 13 2019(Updated: )
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control for Beaglebone SL | <3.5.14.10 | |
CODESYS Control for empc-a/imx6 | <3.5.14.10 | |
CODESYS Control for IoT2000 | <3.5.14.10 | |
CODESYS Control for Linux | <3.5.14.10 | |
WAGO PFC 100 | <3.5.14.10 | |
WAGO PFC200 | <3.5.14.10 | |
CODESYS Control for Raspberry Pi SL | <3.5.14.10 | |
CODESYS Control Runtime System Toolkit | >=3.5.8.60<3.5.12.80 | |
CODESYS Control Runtime System Toolkit | >=3.5.13.0<3.5.14.10 | |
CODESYS Runtime System Toolkit | >=3.0<3.5.12.80 | |
CODESYS Control | >=3.5.9.80<=3.5.12.80 | |
CODESYS Control | >=3.5.13.0<3.5.14.10 | |
CODESYS Remote Target Visu Toolkit | >=3.0<3.5.12.80 | |
CODESYS HMI (SL) | >=3.5.10.0<3.5.12.80 | |
CODESYS HMI (SL) | >=3.5.13.0<3.5.14.10 | |
CODESYS Remote Target Visu Toolkit | >=3.0<3.5.12.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this CODESYS vulnerability is CVE-2019-13532.
CVE-2019-13532 has a severity rating of 7.5 (High).
All versions of CODESYS prior to 3.5.14.10 are affected by CVE-2019-13532.
CVE-2019-13532 allows an attacker to send specially crafted HTTP or HTTPS requests which may allow access to files outside the restricted working directory of the controller.
Yes, upgrading to CODESYS version 3.5.14.10 or above fixes CVE-2019-13532.