First published: Tue Sep 17 2019(Updated: )
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone | >=3.5.11.0<3.5.15.0 | |
Codesys Control For Empc-a\/imx6 | >=3.5.11.0<3.5.15.0 | |
Codesys Control For Iot2000 | >=3.5.11.0<3.5.15.0 | |
Codesys Control For Pfc100 | >=3.5.11.0<3.5.15.0 | |
Codesys Control For Pfc200 | >=3.5.11.0<3.5.15.0 | |
Codesys Control For Raspberry Pi | >=3.5.11.0<3.5.15.0 | |
Codesys Control Rte | >=3.5.11.0<3.5.15.0 | |
Codesys Control Win | >=3.5.11.0<3.5.15.0 | |
Codesys Linux | >=3.5.11.0<3.5.15.0 | |
Codesys Runtime System Toolkit | >=3.5.11.0<3.5.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13542 is a vulnerability in 3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server that allows a NULL pointer dereference, leading to a denial-of-service condition.
The severity of CVE-2019-13542 is medium with a severity value of 6.5.
Versions 3.5.11.0 to 3.5.15.0 of CODESYS V3 OPC UA Server are affected by CVE-2019-13542.
An attacker can exploit CVE-2019-13542 by sending crafted requests from a trusted OPC UA client.
There is currently no known fix for CVE-2019-13542. It is recommended to follow the guidelines provided by the vendor and monitor for any updates or patches.