複数のSchneider Electric製品における複数の脆弱性
| Title |
複数のSchneider Electric製品における複数の脆弱性
|
| Summary |
Schneider Electricが提供する複数の製品には、次の複数の脆弱性が存在します。<ul><li>情報漏えい(CWE-200) - CVE-2018-12130</li><li>入力データの整合性検証不備(CWE-1288) - CVE-2022-47378、CVE-2022-47392、CVE-2022-47391</li><li>境界外書き込み(CWE-787) - CVE-2022-47379、CVE-2023-37557</li><li>スタックベースのバッファオーバーフロー(CWE-121) - CVE-2022-47380、 CVE-2022-47381、 CVE-2022-47382、 CVE-2022-47383、 CVE-2022-47384、 CVE-2022-47386、 CVE-2022-47387、 CVE-2022-47388、 CVE-2022-47389、 CVE-2022-47390、 CVE-2022-47385</li><li>信頼できないポインタの参照(CWE-822) - CVE-2022-47393</li><li>バッファーエラー(CWE-119) - CVE-2022-4046</li><li>データ完全性の検証不備(CWE-354) - CVE-2023-28355</li><li>不適切な入力確認(CWE-20) - CVE-2023-37545、 CVE-2023-37546、 CVE-2023-37547、 CVE-2023-37548、 CVE-2023-37549、 CVE-2023-37550、 CVE-2023-37552、 CVE-2023-37553、 CVE-2023-37554、 CVE-2023-37555、 CVE-2023-37556、 CVE-2023-37558、 CVE-2023-37559</li><li>外部からアクセス可能なファイルまたはディレクトリ(CWE-552) - CVE-2023-37551</li><li>ファイル検索パスの制御不備(CWE-427) - CVE-2023-3662</li><li>通信チャネルで送受信するメッセージに対する完全性の検証不備(CWE-924) - CVE-2023-3663</li><li>過度な認証試行の不適切な制限(CWE-307) - CVE-2023-3669</li><li>誤った領域へのリソースの漏えい(CWE-668) - CVE-2023-3670</li></ul>
|
| Possible impacts |
脆弱性を悪用された場合、次のような影響を受ける可能性があります。<ul><li>情報が漏えいする(CVE-2018-12130)</li><li>サービス運用妨害(DoS)状態にされる(CVE-2022-47378、CVE-2022-47392、CVE-2022-47393、CVE-2022-47391、CVE-2023-37545、CVE-2023-37546、CVE-2023-37547、CVE-2023-37548、CVE-2023-37549、CVE-2023-37550、CVE-2023-37552、CVE-2023-37553、CVE-2023-37554、CVE-2023-37555、CVE-2023-37556、CVE-2023-37557、CVE-2023-37558、 CVE-2023-37559)</li><li>サービス運用妨害(DoS)状態にされたり、メモリを上書きされたり、リモートコードを実行されたりする(CVE-2022-47379、CVE-2022-47380、CVE-2022-47381、CVE-2022-47382、CVE-2022-47383、CVE-2022-47384、CVE-2022-47386、CVE-2022-47387、CVE-2022-47388、CVE-2022-47389、CVE-2022-47390、CVE-2022-47385)</li><li>PLCアプリケーションコードを実行される(CVE-2022-4046、CVE-2023-28355)</li><li>システムを侵害される(CVE-2023-37551)</li><li>悪意ある実行ファイルを実行される(CVE-2023-3662)</li><li>意図しないコードを実行される(CVE-2023-3663)</li><li>無制限にパスワードを試行される(CVE-2023-3669)</li><li>悪意あるスクリプトを実行される(CVE-2023-3670)</li></ul> |
| Solution |
[アップデートする] 開発者は、アップデートを提供しています。 [別製品へ移行する] 開発者は、サポートを終了した製品については別製品への移行を推奨しています。 [ワークアラウンドを実施する] 開発者は、アップデートが適用できない場合、ワークアラウンドの適用を推奨しています。 詳細は、開発者が提供する情報を確認してください。 |
| Publication Date |
Jan. 22, 2026, midnight |
| Registration Date |
Jan. 23, 2026, 10:52 a.m. |
| Last Update |
Jan. 23, 2026, 10:52 a.m. |
Affected System
| Schneider Electric |
|
(複数の製品) (CVE-2022-47378等)
|
|
EcoStruxure Foxboro DCS V91 DCS Virtualization Server バージョン Intel Xeon Silver 4110 (CVE-2018-12130)
|
|
EcoStruxure Foxboro DCS V91 DCS Virtualization Server バージョン Intel Xeon W-2123およびそれ以前 (CVE-2018-12130)
|
|
EcoStruxure Foxboro H92 DCS Standard Workstation バージョン Intel Xeon Silver 4110 (CVE-2018-12130)
|
|
EcoStruxure Foxboro H92 DCS Standard Workstation バージョン Intel Xeon W-2123およびそれ以前 (CVE-2018-12130)
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2026年01月23日] 掲載 |
Jan. 23, 2026, 10:52 a.m. |
NVD Vulnerability Information
CVE-2018-12130
| Summary |
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
|
| Publication Date |
May 31, 2019, 1:29 a.m. |
| Registration Date |
March 1, 2021, 6:48 p.m. |
| Last Update |
Nov. 21, 2024, 12:44 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:microarchitectural_fill_buffer_data_sampling_firmware:-:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:h:intel:microarchitectural_fill_buffer_data_sampling:-:*:*:*:*:*:*:* |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-4046
| Summary |
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.
|
| Publication Date |
Aug. 3, 2023, 10:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:34 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47378
| Summary |
Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47379
| Summary |
An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47380
| Summary |
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47381
| Summary |
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47382
| Summary |
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47383
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47384
| Summary |
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47385
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47386
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47387
| Summary |
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47388
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10:01 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47389
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47390
| Summary |
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47391
| Summary |
In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.
|
| Publication Date |
May 15, 2023, 7:15 p.m. |
| Registration Date |
May 16, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
3.5.18.40 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
3.5.18.40 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.18.40 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
3.5.18.40 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.18.40 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.7.0.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47392
| Summary |
An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/CmpAppBP/CmpAppForce Components of multiple CODESYS products in multiple versions to read from an invalid address which can lead to a denial-of-service condition.
|
| Publication Date |
May 15, 2023, 8:15 p.m. |
| Registration Date |
May 16, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2022-47393
| Summary |
An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.
|
| Publication Date |
May 15, 2023, 8:15 p.m. |
| Registration Date |
May 16, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 4:31 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:hmi_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_win_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(sl\):*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:* |
|
|
|
4.8.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-3662
| Summary |
In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .
|
| Publication Date |
Aug. 3, 2023, 8:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:17 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
3.5.17.0 |
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-3663
| Summary |
In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
|
| Publication Date |
Aug. 3, 2023, 8:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:17 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
3.5.11.20 |
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-3669
| Summary |
A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:17 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-3670
| Summary |
In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.
|
| Publication Date |
July 28, 2023, 5:15 p.m. |
| Registration Date |
July 28, 2023, 8 p.m. |
| Last Update |
Nov. 21, 2024, 5:17 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:scripting:*:*:*:*:*:*:*:* |
4.0.0.0 |
|
|
4.1.0.0 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
3.5.9.0 |
|
|
3.5.17.0 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37545
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37546, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549, CVE-2023-37550
|
| Publication Date |
Aug. 3, 2023, 8:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37546
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37547
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37548
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37549 and CVE-2023-37550
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37549
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37550
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37550
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37549.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37551
| Summary |
In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37552
| Summary |
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37553, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37553
| Summary |
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37554
| Summary |
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37555 and CVE-2023-37556.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37555
| Summary |
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37556.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37556
| Summary |
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37555.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37557
| Summary |
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer, which can lead to a denial-of-service condition.
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37558
| Summary |
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37559
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List
CVE-2023-37559
| Summary |
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37558
|
| Publication Date |
Aug. 3, 2023, 9:15 p.m. |
| Registration Date |
Aug. 4, 2023, 10 a.m. |
| Last Update |
Nov. 21, 2024, 5:11 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* |
|
|
|
4.10.0.0 |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
| cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
|
|
3.5.19.20 |
Related information, measures and tools
Common Vulnerabilities List