First published: Mon May 15 2023(Updated: )
Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Codesys Control For Beaglebone Sl | <3.5.19.0 | |
Codesys Control For Empc-a\/imx6 Sl | <3.5.19.0 | |
Codesys Control For Iot2000 Sl | <3.5.19.0 | |
Codesys Control For Linux Sl | <3.5.19.0 | |
Codesys Control For Pfc100 Sl | <3.5.19.0 | |
Codesys Control For Pfc200 Sl | <3.5.19.0 | |
Codesys Control For Plcnext Sl | <3.5.19.0 | |
Codesys Control For Raspberry Pi Sl | <3.5.19.0 | |
Codesys Control For Wago Touch Panels 600 Sl | <3.5.19.0 | |
Codesys Control Rte \(for Beckhoff Cx\) Sl | <4.8.0.0 | |
Codesys Control Rte \(sl\) | <4.8.0.0 | |
Codesys Control Runtime System Toolkit | <4.8.0.0 | |
Codesys Control Win \(sl\) | <4.8.0.0 | |
CODESYS Development System V3 | <4.8.0.0 | |
Codesys Hmi \(sl\) | <4.8.0.0 | |
Codesys Safety Sil2 Psp | <4.8.0.0 | |
Codesys Safety Sil2 Runtime Toolkit | <4.8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-47378.
The severity of CVE-2022-47378 is medium with a CVSS score of 6.5.
Multiple CODESYS products in multiple versions are affected by CVE-2022-47378. Please refer to the affected software section for the complete list.
An authenticated remote attacker can exploit CVE-2022-47378 by crafting specific requests that use the vulnerability, leading to a denial-of-service condition.
Yes, you can find more information about CVE-2022-47378 at the following link: [Reference Link](https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=)