First published: Tue Oct 26 2021(Updated: )
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys | <1.1.9.22 |
CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34584 is rated as a high severity vulnerability because it can lead to exposure of sensitive memory data or denial-of-service conditions.
To fix CVE-2021-34584, upgrade the CODESYS V2 web server to version 1.1.9.22 or later.
CVE-2021-34584 can be exploited through crafted web server requests to read sensitive memory or cause crashes.
CVE-2021-34584 affects CODESYS versions prior to 1.1.9.22.
There are no known effective workarounds for CVE-2021-34584 beyond upgrading to a patched version.