CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
2021-05-03T14:15:07.667
2024-11-21T06:00:52.023
Modified
CVSSv3.1: 7.3 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | codesys | control_for_beaglebone_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_empc-a\/imx6_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_iot2000_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_linux_arm_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_linux_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_pfc100_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_pfc200_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_plcnext_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_raspberry_pi_sl | < 4.1.0.0 | Yes |
Application | codesys | control_for_wago_touch_panels_600_sl | < 4.1.0.0 | Yes |
Application | codesys | control_rte | < 3.5.17.0 | Yes |
Application | codesys | control_rte | < 3.5.17.0 | Yes |
Application | codesys | control_runtime_system_toolkit | < 3.5.17.0 | Yes |
Application | codesys | control_win | < 3.5.17.0 | Yes |
Application | codesys | edge_gateway | < 3.5.17.0 | Yes |
Application | codesys | edge_gateway | < 4.1.0.0 | Yes |
Application | codesys | embedded_target_visu_toolkit | < 3.5.17.0 | Yes |
Application | codesys | gateway | < 3.5.17.0 | Yes |
Application | codesys | hmi | < 3.5.17.0 | Yes |
Application | codesys | opc_server | < 3.5.17.0 | Yes |
Application | codesys | plchandler | < 3.5.17.0 | Yes |
Application | codesys | remote_target_visu_toolkit | < 3.5.17.0 | Yes |
Application | codesys | safety_sil | < 3.5.17.0 | Yes |
Application | codesys | simulation_runtime | < 3.5.17.0 | Yes |