First published: Tue Sep 17 2019(Updated: )
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control for Beaglebone SL | >=3.5.11.0<3.5.15.0 | |
CODESYS Control for empc-a/imx6 | >=3.5.11.0<3.5.15.0 | |
CODESYS Control for IoT2000 | >=3.5.11.0<3.5.15.0 | |
WAGO PFC 100 | >=3.5.11.0<3.5.15.0 | |
WAGO PFC200 | >=3.5.11.0<3.5.15.0 | |
CODESYS Control for Raspberry Pi SL | >=3.5.11.0<3.5.15.0 | |
CODESYS Control Runtime System Toolkit | >=3.5.11.0<3.5.15.0 | |
CODESYS Control | >=3.5.11.0<3.5.15.0 | |
CODESYS Control for Linux | >=3.5.11.0<3.5.15.0 | |
CoDeSys Runtime Toolkit | >=3.5.11.0<3.5.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13542 is a vulnerability in 3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server that allows a NULL pointer dereference, leading to a denial-of-service condition.
The severity of CVE-2019-13542 is medium with a severity value of 6.5.
Versions 3.5.11.0 to 3.5.15.0 of CODESYS V3 OPC UA Server are affected by CVE-2019-13542.
An attacker can exploit CVE-2019-13542 by sending crafted requests from a trusted OPC UA client.
There is currently no known fix for CVE-2019-13542. It is recommended to follow the guidelines provided by the vendor and monitor for any updates or patches.