8.8
CVE-2022-47385
- EPSS 3.72%
- Veröffentlicht 15.05.2023 10:15:09
- Zuletzt bearbeitet 17.07.2025 13:02:02
- Quelle info@cert.vde.com
- Teams Watchlist Login
- Unerledigt Login
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Codesys ≫ Control For Beaglebone Sl Version < 4.8.0.0
Codesys ≫ Control For Iot2000 Sl Version < 4.8.0.0
Codesys ≫ Control For Linux Sl Version < 4.8.0.0
Codesys ≫ Control For Pfc100 Sl Version < 4.8.0.0
Codesys ≫ Control For Pfc200 Sl Version < 4.8.0.0
Codesys ≫ Control For Plcnext Sl Version < 4.8.0.0
Codesys ≫ Control For Raspberry Pi Sl Version < 4.8.0.0
Codesys ≫ Control For Wago Touch Panels 600 Sl Version < 4.8.0.0
Codesys ≫ Control Runtime System Toolkit Version < 3.5.19.0
Codesys ≫ Development System V3 Version < 3.5.19.0
Codesys ≫ Safety Sil2 Psp Version < 3.5.19.0
Codesys ≫ Safety Sil2 Runtime Toolkit Version < 3.5.19.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.72% | 0.875 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
info@cert.vde.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.