First published: Mon May 15 2023(Updated: )
Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remote attacker to block consecutive logins of a specific type.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control Beaglebone SL | <4.7.0.0 | |
CODESYS Control for empc-a/imx6 | <4.7.0.0 | |
CODESYS Control for IoT2000 | <4.7.0.0 | |
CODESYS Control for Linux | <4.7.0.0 | |
CODESYS Control PFC100 SL | <4.7.0.0 | |
WAGO PFC200 | <4.7.0.0 | |
CODESYS Control for PLCnext | <4.7.0.0 | |
CODESYS Control Raspberry Pi SL | <4.7.0.0 | |
CODESYS Control for WAGO Touch Panels 600 | <4.7.0.0 | |
CODESYS Control RTE SL | <3.5.18.40 | |
CODESYS Control RTE | <3.5.18.40 | |
CODESYS Runtime System Toolkit | <3.5.18.40 | |
CODESYS Control Win SL | <3.5.18.40 | |
CODESYS HMI (SL) | <3.5.18.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-22508.
The severity of CVE-2022-22508 is medium with a severity value of 4.3.
Multiple CODESYS V3 products are affected by CVE-2022-22508, including Control for Beaglebone Sl, Control for Empc-a/imx6 Sl, Control for Iot2000 Sl, Control for Linux Sl, Control for Pfc100 Sl, Control for Pfc200 Sl, Control for Plcnext Sl, Control for Raspberry Pi Sl, Control for Wago Touch Panels 600 Sl, Codesys Control Rte (for Beckhoff Cx) Sl, Codesys Control Rte (sl), Codesys Control Runtime System Toolkit, Codesys Control Win (sl), and Codesys Hmi (sl).
An authenticated remote attacker can exploit CVE-2022-22508 by blocking consecutive logins of a specific type.
You can find more information about CVE-2022-22508 [here](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17351&token=a7c02b2825fea2bcaf80c1a8e62097d72ec90f1a&download=).