First published: Mon Jul 11 2022(Updated: )
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone | <4.5.0.0 | |
Codesys Control For Empc-a\/imx6 | <4.5.0.0 | |
Codesys Control For Iot2000 Sl | <4.6.0.0 | |
Codesys Control For Linux Sl | <4.5.0.0 | |
Codesys Control For Pfc100 Sl | <4.5.0.0 | |
Codesys Control For Pfc200 Sl | <4.5.0.0 | |
Codesys Control For Plcnext | <4.6.0.0 | |
Codesys Control For Raspberry Pi Sl | <4.5.0.0 | |
Codesys Control For Wago Touch Panels 600 | <4.5.0.0 | |
Codesys Control Rte Sl | <3.5.18.20 | |
Codesys Control Rte Sl \(for Beckhoff Cx\) | <3.5.18.20 | |
Codesys Control Runtime System Toolkit | <3.5.18.20 | |
Codesys Control Win | <3.5.18.20 | |
CODESYS Development System | <3.5.18.20 | |
Codesys Edge Gateway | <3.5.18.20 | |
Codesys Edge Gateway | <4.5.0.0 | |
Codesys Embedded Target Visu Toolkit | <3.5.18.20 | |
CODESYS Gateway | <3.5.18.20 | |
Codesys Hmi | <3.5.18.20 | |
Codesys Remote Target Visu Toolkit | <3.5.18.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30792 is a vulnerability in CmpChannelServer of CODESYS V3 that allows an unauthorized attacker to block new communication channel connections.
Multiple versions of CODESYS V3, including Codesys Control For Beaglebone, Codesys Control For Empc-a/imx6, Codesys Control For Iot2000 Sl, Codesys Control For Linux Sl, Codesys Control For Pfc100 Sl, Codesys Control For Pfc200 Sl, Codesys Control For Plcnext, Codesys Control For Raspberry Pi Sl, Codesys Control For Wago Touch Panels 600, Codesys Control Rte Sl, Codesys Control Rte Sl (for Beckhoff Cx), Codesys Control Runtime System Toolkit, Codesys Control Win, CODESYS Development System, Codesys Edge Gateway, Codesys Embedded Target Visu Toolkit, CODESYS Gateway, Codesys Hmi, and Codesys Remote Target Visu Toolkit.
CVE-2022-30792 has a severity rating of 7.5 (High).
An unauthorized attacker can exploit CVE-2022-30792 by consuming excessive resources, thereby blocking new communication channel connections.
Yes, it is recommended to update to the latest version of the affected software to mitigate the vulnerability.