First published: Mon May 15 2023(Updated: )
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control Beaglebone SL | <3.5.19.0 | |
CODESYS Control for empc-a/imx6 | <3.5.19.0 | |
CODESYS Control for IoT2000 | <3.5.19.0 | |
CODESYS Control for Linux | <3.5.19.0 | |
CODESYS Control PFC100 SL | <3.5.19.0 | |
WAGO PFC200 | <3.5.19.0 | |
CODESYS Control for PLCnext | <3.5.19.0 | |
CODESYS Control Raspberry Pi SL | <3.5.19.0 | |
CODESYS Control for WAGO Touch Panels 600 | <3.5.19.0 | |
CODESYS Control RTE SL | <4.8.0.0 | |
CODESYS Control RTE | <4.8.0.0 | |
CODESYS Runtime System Toolkit | <4.8.0.0 | |
CODESYS Control Win SL | <4.8.0.0 | |
CODESYS Development System | <4.8.0.0 | |
CODESYS HMI (SL) | <4.8.0.0 | |
CODESYS Safety SIL2 | <4.8.0.0 | |
CODESYS Safety SIL2 | <4.8.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47386 is a stack-based out-of-bounds write vulnerability in the CmpTraceMgr component of multiple CODESYS products.
CVE-2022-47386 can lead to a denial-of-service condition, memory overwriting, or remote code execution in CODESYS products.
CVE-2022-47386 affects multiple CODESYS products, including Codesys Control For Beaglebone Sl, Codesys Control For Empc-a/imx6 Sl, Codesys Control For IoT2000 Sl, and others.
CVE-2022-47386 has a severity level of 8.8 (high).
To fix CVE-2022-47386, it is recommended to update to a version that includes a patch or mitigation provided by CODESYS.