First published: Mon Jul 11 2022(Updated: )
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone | <4.5.0.0 | |
Codesys Control For Empc-a\/imx6 | <4.5.0.0 | |
Codesys Control For Iot2000 Sl | <4.6.0.0 | |
Codesys Control For Linux Sl | <4.5.0.0 | |
Codesys Control For Pfc100 Sl | <4.5.0.0 | |
Codesys Control For Pfc200 Sl | <4.5.0.0 | |
Codesys Control For Plcnext | <4.6.0.0 | |
Codesys Control For Raspberry Pi Sl | <4.5.0.0 | |
Codesys Control For Wago Touch Panels 600 | <4.5.0.0 | |
Codesys Control Rte Sl | <3.5.18.20 | |
Codesys Control Rte Sl \(for Beckhoff Cx\) | <3.5.18.20 | |
Codesys Control Runtime System Toolkit | <3.5.18.20 | |
Codesys Control Win | <3.5.18.20 | |
CODESYS Development System | <3.5.18.20 | |
Codesys Edge Gateway | <3.5.18.20 | |
Codesys Edge Gateway | <4.5.0.0 | |
Codesys Embedded Target Visu Toolkit | <3.5.18.20 | |
CODESYS Gateway | <3.5.18.20 | |
Codesys Hmi | <3.5.18.20 | |
Codesys Remote Target Visu Toolkit | <3.5.18.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30791.
The severity of CVE-2022-30791 is high (7.5).
Multiple versions of CODESYS V3 are affected, including Codesys Control For Beaglebone, Codesys Control For Empc-a/imx6, Codesys Control For Iot2000 Sl, Codesys Control For Linux Sl, Codesys Control For Pfc100 Sl, Codesys Control For Pfc200 Sl, Codesys Control For Plcnext, Codesys Control For Raspberry Pi Sl, and Codesys Control For Wago Touch Panels 600.
An unauthorized attacker can block new TCP connections, but existing connections are not affected.
You can find more information about CVE-2022-30791 at this link: [insert link]