Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-37551


In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.


Published

2023-08-03T12:15:10.257

Last Modified

2024-11-21T08:11:55.417

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-552

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application codesys control_for_beaglebone_sl < 4.10.0.0 Yes
Application codesys control_for_empc-a\/imx6_sl < 4.10.0.0 Yes
Application codesys control_for_iot2000_sl < 4.10.0.0 Yes
Application codesys control_for_linux_sl < 4.10.0.0 Yes
Application codesys control_for_pfc100_sl < 4.10.0.0 Yes
Application codesys control_for_pfc200_sl < 4.10.0.0 Yes
Application codesys control_for_plcnext_sl < 4.10.0.0 Yes
Application codesys control_for_raspberry_pi_sl < 4.10.0.0 Yes
Application codesys control_for_wago_touch_panels_600_sl < 4.10.0.0 Yes
Application codesys control_rte_sl < 3.5.19.20 Yes
Application codesys control_rte_sl_\(for_beckhoff_cx\) < 3.5.19.20 Yes
Application codesys control_runtime_system_toolkit < 3.5.19.20 Yes
Application codesys control_win_sl < 3.5.19.20 Yes
Application codesys development_system < 3.5.19.20 Yes
Application codesys hmi < 3.5.19.20 Yes
Application codesys safety_sil2 < 3.5.19.20 Yes

References