First published: Thu Apr 07 2022(Updated: )
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone Sl | <4.5.0.0 | |
Codesys Control For Beckhoff Cx9020 | <4.5.0.0 | |
Codesys Control For Empc-a\/imx6 Sl | <4.5.0.0 | |
Codesys Control For Iot2000 Sl | <4.5.0.0 | |
Codesys Control For Linux Sl | <4.5.0.0 | |
Codesys Control For Pfc100 Sl | <4.5.0.0 | |
Codesys Control For Pfc200 Sl | <4.5.0.0 | |
Codesys Control For Plcnext Sl | <4.5.0.0 | |
Codesys Control For Raspberry Pi Sl | <4.5.0.0 | |
Codesys Control For Wago Touch Panels 600 Sl | <4.5.0.0 | |
Codesys Control Rte Sl | <3.5.18.0 | |
Codesys Control Rte Sl \(for Beckhoff Cx\) | <3.5.18.0 | |
Codesys Control Runtime System Toolkit | <3.5.18.0 | |
Codesys Control Win Sl | <3.5.18.0 | |
CODESYS Development System | <3.5.18.0 | |
Codesys Embedded Target Visu Toolkit | <3.5.18.0 | |
Codesys Hmi Sl | <3.5.18.0 | |
Codesys Remote Target Visu Toolkit | <3.5.18.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-22519.
The severity level of CVE-2022-22519 is high with a score of 7.5.
CVE-2022-22519 affects various versions of CODESYS Control runtime system, including 4.5.0.0 and below.
CVE-2022-22519 allows a remote, unauthenticated attacker to crash the webserver of the CODESYS Control runtime system by sending crafted HTTP or HTTPS requests causing a buffer over-read.
Yes, it is recommended to update to a version of CODESYS Control runtime system beyond 4.5.0.0 to mitigate CVE-2022-22519.