First published: Fri Jun 24 2022(Updated: )
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
Credit: info@cert.vde.com info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Development System | <2.3.9.69 | |
CODESYS Edge Gateway | <3.5.18.30 | |
3S-Smart CODESYS Gateway Server | <2.3.9.38 | |
CODESYS HMI | <3.5.18.30 | |
CODESYS OPC Server | <3.5.18.30 | |
CODESYS plchandler | <3.5.18.30 | |
CODESYS Runtime | <2.4.7.57 | |
CODESYS Runtime Toolkit | <2.4.7.57 | |
CODESYS SP Realtime NT | <2.3.7.30 | |
CODESYS Web Server | <1.1.9.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31805 has been classified as a medium severity vulnerability.
You can mitigate CVE-2022-31805 by ensuring that passwords are transmitted over secure channels, such as using encryption protocols.
CVE-2022-31805 affects multiple components in CODESYS Development System versions before 2.3.9.69 and CODESYS Edge Gateway versions before 3.5.18.30.
CVE-2022-31805 allows for the unprotected transmission of passwords, potentially leading to unauthorized access and data breaches.
Yes, patches and updated versions are available, and users should check with CODESYS for specific remediation instructions.