Codesys

Control Rte Sl

31 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Published 11.07.2022 11:15:08
  • Last modified 21.11.2024 07:03:23

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

  • EPSS 1.31%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:56

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

  • EPSS 1.03%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:56

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

  • EPSS 0.04%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:56

The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.

  • EPSS 0.09%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:56

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

  • EPSS 0.68%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:56

An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally...

  • EPSS 0.55%
  • Published 07.04.2022 19:15:08
  • Last modified 21.11.2024 06:46:55

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.

  • EPSS 0.14%
  • Published 15.08.2019 17:15:13
  • Last modified 21.11.2024 04:50:48

An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all...

  • EPSS 1.43%
  • Published 19.02.2019 21:29:00
  • Last modified 21.11.2024 04:00:47

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

  • EPSS 1.54%
  • Published 19.02.2019 21:29:00
  • Last modified 21.11.2024 04:00:46

Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.