Codesys

Remote Target Visu Toolkit

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.46%
  • Veröffentlicht 23.03.2023 11:15:12
  • Zuletzt bearbeitet 21.11.2024 04:03:26

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

  • EPSS 0.39%
  • Veröffentlicht 11.07.2022 11:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:23

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

  • EPSS 0.54%
  • Veröffentlicht 11.07.2022 11:15:08
  • Zuletzt bearbeitet 21.11.2024 07:03:23

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.

  • EPSS 0.55%
  • Veröffentlicht 07.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:55

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.

  • EPSS 0.68%
  • Veröffentlicht 07.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:56

An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally...

  • EPSS 0.09%
  • Veröffentlicht 07.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:56

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

  • EPSS 1.03%
  • Veröffentlicht 07.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:56

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

  • EPSS 1.31%
  • Veröffentlicht 07.04.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 06:46:56

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

  • EPSS 0.54%
  • Veröffentlicht 03.08.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:08:55

CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.

  • EPSS 0.32%
  • Veröffentlicht 03.08.2021 16:15:08
  • Zuletzt bearbeitet 21.11.2024 06:14:02

In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.