CVE-2022-30792

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*
cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*
cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*

History

20 Jul 2022, 15:27

Type Values Removed Values Added
First Time Codesys control For Raspberry Pi Sl
Codesys remote Target Visu Toolkit
Codesys development System
Codesys control Rte Sl
Codesys control For Pfc200 Sl
Codesys control Rte Sl \(for Beckhoff Cx\)
Codesys control For Empc-a\/imx6
Codesys hmi
Codesys control For Linux Sl
Codesys gateway
Codesys control For Plcnext
Codesys control For Wago Touch Panels 600
Codesys control For Pfc100 Sl
Codesys embedded Target Visu Toolkit
Codesys edge Gateway
Codesys control Win
Codesys
Codesys control Runtime System Toolkit
Codesys control For Iot2000 Sl
Codesys control For Beaglebone
References (CONFIRM) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17128&token=bee4d8a57f19be289d623ec90135493b5f9179e3&download= - (CONFIRM) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17128&token=bee4d8a57f19be289d623ec90135493b5f9179e3&download= - Vendor Advisory
CPE cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*
cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*
cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.3
v2 : 5.0
v3 : 7.5

11 Jul 2022, 11:57

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-11 11:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-30792

Mitre link : CVE-2022-30792

CVE.ORG link : CVE-2022-30792


JSON object : View

Products Affected

codesys

  • control_rte_sl
  • development_system
  • gateway
  • control_for_wago_touch_panels_600
  • control_for_pfc200_sl
  • control_rte_sl_\(for_beckhoff_cx\)
  • control_for_raspberry_pi_sl
  • edge_gateway
  • remote_target_visu_toolkit
  • control_for_pfc100_sl
  • control_win
  • embedded_target_visu_toolkit
  • control_for_plcnext
  • control_for_empc-a\/imx6
  • hmi
  • control_for_linux_sl
  • control_for_beaglebone
  • control_for_iot2000_sl
  • control_runtime_system_toolkit
CWE
CWE-400

Uncontrolled Resource Consumption