First published: Fri Oct 25 2019(Updated: )
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Eni Server | <3.2.2.25 | |
Codesys | >=2.3<2.3.9.61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16265 is classified as a high severity vulnerability due to the potential for a buffer overflow.
To mitigate CVE-2019-16265, upgrade the CODESYS ENI server to version 3.2.2.25 or later.
CVE-2019-16265 affects CODESYS V2.3 ENI server versions up to 3.2.2.24 and CODESYS versions between 2.3 and 2.3.9.61.
A buffer overflow in CVE-2019-16265 occurs when data exceeds the allocated space in memory, potentially allowing code execution.
Yes, CVE-2019-16265 can be exploited remotely if the affected service is accessible.