First published: Tue Oct 26 2021(Updated: )
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS PLCWinNT | <2.4.7.56 | |
Codesys Runtime Toolkit | <2.4.7.56 |
CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products: * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56 * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34593 is a vulnerability found in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, which can result in denial-of-service conditions.
CVE-2021-34593 has a severity rating of 7.5 (high).
CVE-2021-34593 can stop running PLC programs or cause memory leaks.
CVE-2021-34593 can block further communication clients from accessing the affected system.
Yes, updating to versions V2.4.7.56 or above of CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT can fix the vulnerability.