First published: Fri Jun 24 2022(Updated: )
In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS PLCWinNT | >=2.0<2.4.7.57 | |
Codesys Runtime Toolkit | >=2.0<2.4.7.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-32136.
Multiple CODESYS products are affected, including CODESYS PLCWinNT and Codesys Runtime Toolkit.
A low privileged remote attacker can craft a request that causes a read access to an uninitialized pointer, resulting in a denial-of-service.
No, user interaction is not required for this vulnerability to be exploited.
The severity level of this vulnerability is medium, with a CVSS score of 6.5.
To fix this vulnerability, it is recommended to upgrade to a version of CODESYS that is not affected by the issue.
More information about this vulnerability can be found at the following link: [link](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=)
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-824.