First published: Fri Jun 24 2022(Updated: )
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Gateway | >=2.0<2.3.9.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31803 is a vulnerability in CODESYS Gateway Server V2 that allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the server.
CVE-2022-31803 has a severity rating of 5.3, which is considered medium.
CVE-2022-31803 affects CODESYS Gateway Server V2 by allowing an attacker to consume all available TCP connections, thereby preventing new connections from legitimate users or clients.
Users of CODESYS Gateway Server V2 versions 2.0 to 2.3.9.38 are affected by CVE-2022-31803.
To mitigate CVE-2022-31803, it is recommended to update CODESYS Gateway Server V2 to a version that includes a fix for the vulnerability.