An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
References
Configurations
Configuration 1 (hide)
|
History
18 Apr 2022, 13:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:* cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:* cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:* |
|
References | (MISC) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17091&token=c450f8bbbd838c647d102f359356386c6ea5aeca&download= - Vendor Advisory | |
First Time |
Codesys hmi Sl
Codesys control For Empc-a\/imx6 Sl Codesys control Rte Sl Codesys control For Beaglebone Sl Codesys embedded Target Visu Toolkit Codesys control For Linux Sl Codesys control Rte Sl \(for Beckhoff Cx\) Codesys edge Gateway Codesys gateway Codesys control For Beckhoff Cx9020 Codesys remote Target Visu Toolkit Codesys control Runtime System Toolkit Codesys control For Raspberry Pi Sl Codesys control For Pfc100 Sl Codesys Codesys control For Pfc200 Sl Codesys control Win Sl Codesys development System Codesys control For Iot2000 Sl Codesys control For Plcnext Sl Codesys control For Wago Touch Panels 600 Sl |
|
CWE | CWE-330 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
07 Apr 2022, 19:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-07 19:15
Updated : 2023-12-10 14:22
NVD link : CVE-2022-22517
Mitre link : CVE-2022-22517
CVE.ORG link : CVE-2022-22517
JSON object : View
Products Affected
codesys
- control_rte_sl
- control_for_wago_touch_panels_600_sl
- development_system
- gateway
- control_for_pfc200_sl
- control_rte_sl_\(for_beckhoff_cx\)
- control_for_plcnext_sl
- control_for_beckhoff_cx9020
- hmi_sl
- control_for_raspberry_pi_sl
- edge_gateway
- remote_target_visu_toolkit
- control_for_beaglebone_sl
- control_for_pfc100_sl
- embedded_target_visu_toolkit
- control_win_sl
- control_for_linux_sl
- control_for_empc-a\/imx6_sl
- control_for_iot2000_sl
- control_runtime_system_toolkit