First published: Tue Aug 03 2021(Updated: )
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control Beaglebone SL | <4.2.0.0 | |
CODESYS Control for empc-a/imx6 | <4.2.0.0 | |
CODESYS Control for IoT2000 | <4.2.0.0 | |
CODESYS Control for Linux SL | <=4.2.0.0 | |
CODESYS control pfc100 sl | <4.2.0.0 | |
CODESYS Control for pfc200 SL | <4.2.0.0 | |
CODESYS Control for PLCnext SL | <4.2.0.0 | |
CODESYS Control Raspberry Pi SL | <4.2.0.0 | |
CODESYS Control | <4.2.0.0 | |
CODESYS Control Runtime System Toolkit | <3.5.17.10 | |
CODESYS Control RTE | <3.5.17.10 | |
CODESYS Runtime System Toolkit | <3.5.17.10 | |
CODESYS Control Win SL | <3.5.17.10 | |
CODESYS Remote Target Visu Toolkit | <3.5.17.10 | |
CODESYS HMI (SL) | <3.5.17.10 | |
CODESYS Remote Target Visu Toolkit | <3.5.17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33485 is a vulnerability in the CODESYS Control Runtime system before version 3.5.17.10, leading to a heap-based buffer overflow.
CVE-2021-33485 has a severity rating of 9.8 (critical).
CODESYS Control Runtime system versions before 3.5.17.10 are affected. This includes Codesys Control, Codesys Control Rte, Codesys Control Runtime System Toolkit, and other related software.
To fix CVE-2021-33485, users should upgrade their CODESYS Control Runtime system to version 3.5.17.10 or later.
You can find more information about CVE-2021-33485 at the following link: [https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=)