7.5

CVE-2022-22517

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

Data is provided by the National Vulnerability Database (NVD)
CodesysControl For Beaglebone Sl Version < 4.5.0.0
CodesysControl For Beckhoff Cx9020 Version < 4.5.0.0
CodesysControl For Empc-a/imx6 Sl Version < 4.5.0.0
CodesysControl For Iot2000 Sl Version < 4.5.0.0
CodesysControl For Linux Sl Version < 4.5.0.0
CodesysControl For Pfc100 Sl Version < 4.5.0.0
CodesysControl For Pfc200 Sl Version < 4.5.0.0
CodesysControl For Plcnext Sl Version < 4.5.0.0
CodesysControl For Raspberry Pi Sl Version < 4.5.0.0
CodesysControl Rte Sl Version < 3.5.18.0
CodesysControl Runtime System Toolkit Version < 3.5.18.0
CodesysControl Win Sl Version < 3.5.18.0
CodesysDevelopment System Version >= 3.0 < 3.5.18.0
CodesysEdge Gateway SwPlatformwindows Version < 3.5.18.0
CodesysEdge Gateway SwPlatformlinux Version < 4.5.0.0
CodesysEmbedded Target Visu Toolkit Version < 3.5.18.0
CodesysGateway Version < 3.5.18.0
CodesysHmi Sl Version < 3.5.18.0
CodesysRemote Target Visu Toolkit Version < 3.5.18.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.03% 0.764
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
info@cert.vde.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-330 Use of Insufficiently Random Values

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

CWE-334 Small Space of Random Values

The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks.