First published: Tue Oct 26 2021(Updated: )
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Development System | <1.1.9.22 |
CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34585 has been classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2021-34585, update the CODESYS V2 software to version 1.1.9.22 or later.
CVE-2021-34585 can lead to a denial of service condition, rendering the web server non-responsive.
If you are using CODESYS versions prior to 1.1.9.22, your system is vulnerable to CVE-2021-34585.
CVE-2021-34585 can be exploited through crafted web server requests that trigger a parser error.