Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-47389 (GCVE-0-2022-47389)
Vulnerability from cvelistv5
- CWE-787 - Out-of-bounds Write
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CODESYS | CODESYS Control RTE (SL) |
Version: V0.0.0.0 ≤ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:55:08.296Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-47389",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-05T18:37:17.996509Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-05T18:59:49.436Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CODESYS Control RTE (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control RTE (for Beckhoff CX) SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control Win (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control Runtime System Toolkit",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Safety SIL2 Runtime Toolkit",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Safety SIL2 PSP",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS HMI (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Development System V3",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for BeagleBone SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for emPC-A/iMX6 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for IOT2000 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Linux SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC100 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC200 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PLCnext SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Raspberry Pi SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for WAGO Touch Panels 600 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Vladimir Tokarev, Microsoft"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u0026nbsp;to a denial-of-service condition, memory overwriting, or remote code execution."
}
],
"value": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-15T09:57:37.177Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS: Multiple products prone to stack based out-of-bounds write",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-47389",
"datePublished": "2023-05-15T09:57:37.177Z",
"dateReserved": "2022-12-14T06:03:27.265Z",
"dateUpdated": "2025-03-05T18:59:49.436Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-47389\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2023-05-15T10:15:10.243\",\"lastModified\":\"2025-07-17T13:09:56.670\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"D2A50DA7-2372-470C-A4DD-29837A4D428A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_empc-a\\\\/imx6_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"0ADC5883-5087-45E0-95E2-3D414C6417DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"7178B980-82CC-4A30-B278-A4D1F319D678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"8AFD0474-DCBC-4F9E-BE1B-7BDCCB9D801F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"61D99F13-9297-4812-90AD-3EB43276D344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"E5F2E302-39C1-4674-A2BE-A6D1D761B4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"FF8FBED1-D729-4E07-A644-70D8FC87E965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"00EF8A8D-8A5F-4E7B-A14A-BFEE3297E3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"2AA9F089-875B-4A90-A818-1BD06602D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_\\\\(for_beckhoff_cx\\\\)_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"F1A18AA8-CDF4-4664-906F-76060AFED925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"725E570C-6F46-4526-90B5-F4CAF70A7688\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"AD993BD6-B52E-4BA7-A7D7-A0EBE7FDEDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_win_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"FBA9CDA8-4FA0-4258-B477-D2C8DBDD8B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"FC41CB40-21CD-4621-9B23-9BF8E0AE93E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:hmi_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"C664BC1C-889F-4A54-8E81-AB60B0D4D93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"49220E0D-3DD6-492B-BD58-C4951D7D2B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"DDF04E45-90A5-47FB-8101-9A56BD4F9C3F\"}]}]}],\"references\":[{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
fkie_cve-2022-47389
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download= | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download= | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| codesys | control_for_beaglebone_sl | * | |
| codesys | control_for_empc-a\/imx6_sl | * | |
| codesys | control_for_iot2000_sl | * | |
| codesys | control_for_linux_sl | * | |
| codesys | control_for_pfc100_sl | * | |
| codesys | control_for_pfc200_sl | * | |
| codesys | control_for_plcnext_sl | * | |
| codesys | control_for_raspberry_pi_sl | * | |
| codesys | control_for_wago_touch_panels_600_sl | * | |
| codesys | control_rte_\(for_beckhoff_cx\)_sl | * | |
| codesys | control_rte_\(sl\) | * | |
| codesys | control_runtime_system_toolkit | * | |
| codesys | control_win_\(sl\) | * | |
| codesys | development_system_v3 | * | |
| codesys | hmi_\(sl\) | * | |
| codesys | safety_sil2_psp | * | |
| codesys | safety_sil2_runtime_toolkit | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A50DA7-2372-470C-A4DD-29837A4D428A",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADC5883-5087-45E0-95E2-3D414C6417DF",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7178B980-82CC-4A30-B278-A4D1F319D678",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFD0474-DCBC-4F9E-BE1B-7BDCCB9D801F",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61D99F13-9297-4812-90AD-3EB43276D344",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5F2E302-39C1-4674-A2BE-A6D1D761B4E2",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF8FBED1-D729-4E07-A644-70D8FC87E965",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00EF8A8D-8A5F-4E7B-A14A-BFEE3297E3B5",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AA9F089-875B-4A90-A818-1BD06602D7E4",
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1A18AA8-CDF4-4664-906F-76060AFED925",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "725E570C-6F46-4526-90B5-F4CAF70A7688",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD993BD6-B52E-4BA7-A7D7-A0EBE7FDEDEF",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA9CDA8-4FA0-4258-B477-D2C8DBDD8B2F",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC41CB40-21CD-4621-9B23-9BF8E0AE93E3",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*",
"matchCriteriaId": "C664BC1C-889F-4A54-8E81-AB60B0D4D93B",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49220E0D-3DD6-492B-BD58-C4951D7D2B75",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF04E45-90A5-47FB-8101-9A56BD4F9C3F",
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution."
},
{
"lang": "es",
"value": "Un atacante remoto autenticado puede usar una vulnerabilidad de escritura fuera de los l\u00edmites basada en la pila en el componente CmpTraceMgr de m\u00faltiples productos CODESYS en m\u00faltiples versiones para escribir datos en la pila, lo que puede provocar una condici\u00f3n de denegaci\u00f3n de servicio, sobrescritura de memoria o ejecuci\u00f3n remota de c\u00f3digo."
}
],
"id": "CVE-2022-47389",
"lastModified": "2025-07-17T13:09:56.670",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Primary"
}
]
},
"published": "2023-05-15T10:15:10.243",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "info@cert.vde.com",
"type": "Primary"
}
]
}
icsa-24-030-07
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an authenticated attacker to use specifically crafted communication requests to perform a denial-of-service condition, memory overwriting, or remote code execution.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting this these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-24-030-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-030-07.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-24-030-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Rockwell Automation LP30/40/50 and BM40 Operator Interface",
"tracking": {
"current_release_date": "2024-01-30T07:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-030-07",
"initial_release_date": "2024-01-30T07:00:00.000000Z",
"revision_history": [
{
"date": "2024-01-30T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP30 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "LP30 Operator Panel"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP40 Operator Pane: \u003cV3.5.19.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "LP40 Operator Pane"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP50 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "LP50 Operator Panel"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation BM40 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "BM40 Operator Panel"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-47378",
"cwe": {
"id": "CWE-1288",
"name": "Improper Validation of Consistency within Input"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpFiletransfer component to read internally from an invalid address, potentially leading to a denial-of-service condition. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47378"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47379",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to memory, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47379"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47380",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47380"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47381",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47381"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47382",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47382"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47383",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47383"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47384",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47384"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47386",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47386"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47387",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47387"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47388",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47388"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47390",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47390"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47385",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpAppForce component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47385"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47392",
"cwe": {
"id": "CWE-1288",
"name": "Improper Validation of Consistency within Input"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpApp/CmpAppBP/CmpAppForce components to read internally from an invalid address, potentially leading to a denial-of-service condition. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47392"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47393",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the cmpFiletransfer component to dereference addresses provided by the request for internal read access, which can lead to a denial-of-service situation.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47393"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
ICSA-24-030-07
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an authenticated attacker to use specifically crafted communication requests to perform a denial-of-service condition, memory overwriting, or remote code execution.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of this these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting this these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-24-030-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-030-07.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-24-030-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-030-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Rockwell Automation LP30/40/50 and BM40 Operator Interface",
"tracking": {
"current_release_date": "2024-01-30T07:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-24-030-07",
"initial_release_date": "2024-01-30T07:00:00.000000Z",
"revision_history": [
{
"date": "2024-01-30T07:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP30 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "LP30 Operator Panel"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP40 Operator Pane: \u003cV3.5.19.0",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "LP40 Operator Pane"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation LP50 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "LP50 Operator Panel"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.5.19.0",
"product": {
"name": "Rockwell Automation BM40 Operator Panel: \u003cV3.5.19.0",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "BM40 Operator Panel"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-47378",
"cwe": {
"id": "CWE-1288",
"name": "Improper Validation of Consistency within Input"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpFiletransfer component to read internally from an invalid address, potentially leading to a denial-of-service condition. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47378"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47379",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to memory, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47379"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47380",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47380"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47381",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpApp component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47381"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47382",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47382"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47383",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47383"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47384",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47384"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47386",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47386"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47387",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47387"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47388",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47388"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47389",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47389"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47390",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpTraceMgr component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47390"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47385",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the CmpAppForce component to write threat actor-controlled data to stack, which can lead to a denial-of-service condition, memory overwriting, or remote code execution. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47385"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47392",
"cwe": {
"id": "CWE-1288",
"name": "Improper Validation of Consistency within Input"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests with inconsistent content can cause the CmpApp/CmpAppBP/CmpAppForce components to read internally from an invalid address, potentially leading to a denial-of-service condition. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47392"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
},
{
"cve": "CVE-2022-47393",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "After successful authentication, specifically crafted communication requests can cause the cmpFiletransfer component to dereference addresses provided by the request for internal read access, which can lead to a denial-of-service situation.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-47393"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation recommends users with the affected software apply the following risk mitigations, if possible:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
},
{
"category": "mitigation",
"details": "Upgrade to CODESYS version 3.5.19.2 which has been released to mitigate these issues.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.asem.it/en/download-area/74/codesys.html?cat=0"
},
{
"category": "mitigation",
"details": "Additionally, we encourage the customer to implement our suggested security best practices to minimize risk of the vulnerability.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
},
{
"category": "mitigation",
"details": "Customers can use Stakeholder-Specific Vulnerability Categorization to generate more environment-specific prioritization.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://www.cisa.gov/ssvc"
},
{
"category": "mitigation",
"details": "Additional information can be found in the CODESYS Advisory.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004"
]
}
]
}
]
}
wid-sec-w-2023-2270
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "CODESYS ist eine herstellerunabh\u00e4ngige Automatisierungssoftware f\u00fcr die Entwicklung von Steuerungsanwendungen in der industriellen Automatisierung.\r\nDie ABB AC-500 ist eine speicherprogrammierbare Steuerung (SPS).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Codesys V3 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Speicher zu \u00fcberschreiben oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2270 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2270.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2270 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2270"
},
{
"category": "external",
"summary": "ABB Cyber Security Advisory vom 2023-09-05",
"url": "https://search.abb.com/library/Download.aspx?Action=Launch\u0026DocumentID=3ADR011211"
},
{
"category": "external",
"summary": "VDE-CERT Security Advisory VDE-2023-063 vom 2024-01-30",
"url": "https://cert.vde.com/de/advisories/VDE-2023-063/"
}
],
"source_lang": "en-US",
"title": "Codesys V3: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-01-29T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:58:04.787+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2270",
"initial_release_date": "2023-09-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-29T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von VDE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "ABB AC-500 \u003c V3 3.7.0",
"product": {
"name": "ABB AC-500 \u003c V3 3.7.0",
"product_id": "T029732",
"product_identification_helper": {
"cpe": "cpe:/h:abb:ac-500:v3_3.7.0"
}
}
}
],
"category": "vendor",
"name": "ABB"
},
{
"branches": [
{
"category": "product_name",
"name": "CODESYS CODESYS v3",
"product": {
"name": "CODESYS CODESYS v3",
"product_id": "T032407",
"product_identification_helper": {
"cpe": "cpe:/a:codesys:codesys:v3"
}
}
}
],
"category": "vendor",
"name": "CODESYS"
},
{
"branches": [
{
"category": "product_name",
"name": "FESTO CPX",
"product": {
"name": "FESTO CPX",
"product_id": "T032401",
"product_identification_helper": {
"cpe": "cpe:/h:festo:cpx:-"
}
}
}
],
"category": "vendor",
"name": "FESTO"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-47393",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47393"
},
{
"cve": "CVE-2022-47392",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47392"
},
{
"cve": "CVE-2022-47390",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47390"
},
{
"cve": "CVE-2022-47389",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47389"
},
{
"cve": "CVE-2022-47388",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47388"
},
{
"cve": "CVE-2022-47387",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47387"
},
{
"cve": "CVE-2022-47386",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47386"
},
{
"cve": "CVE-2022-47385",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47385"
},
{
"cve": "CVE-2022-47384",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47384"
},
{
"cve": "CVE-2022-47383",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47383"
},
{
"cve": "CVE-2022-47382",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47382"
},
{
"cve": "CVE-2022-47381",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47381"
},
{
"cve": "CVE-2022-47380",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47380"
},
{
"cve": "CVE-2022-47379",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47379"
},
{
"cve": "CVE-2022-47378",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47378"
}
]
}
WID-SEC-W-2023-2270
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "CODESYS ist eine herstellerunabh\u00e4ngige Automatisierungssoftware f\u00fcr die Entwicklung von Steuerungsanwendungen in der industriellen Automatisierung.\r\nDie ABB AC-500 ist eine speicherprogrammierbare Steuerung (SPS).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Codesys V3 ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Speicher zu \u00fcberschreiben oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2270 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2270.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2270 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2270"
},
{
"category": "external",
"summary": "ABB Cyber Security Advisory vom 2023-09-05",
"url": "https://search.abb.com/library/Download.aspx?Action=Launch\u0026DocumentID=3ADR011211"
},
{
"category": "external",
"summary": "VDE-CERT Security Advisory VDE-2023-063 vom 2024-01-30",
"url": "https://cert.vde.com/de/advisories/VDE-2023-063/"
}
],
"source_lang": "en-US",
"title": "Codesys V3: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-01-29T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:58:04.787+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2270",
"initial_release_date": "2023-09-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-01-29T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von VDE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "ABB AC-500 \u003c V3 3.7.0",
"product": {
"name": "ABB AC-500 \u003c V3 3.7.0",
"product_id": "T029732",
"product_identification_helper": {
"cpe": "cpe:/h:abb:ac-500:v3_3.7.0"
}
}
}
],
"category": "vendor",
"name": "ABB"
},
{
"branches": [
{
"category": "product_name",
"name": "CODESYS CODESYS v3",
"product": {
"name": "CODESYS CODESYS v3",
"product_id": "T032407",
"product_identification_helper": {
"cpe": "cpe:/a:codesys:codesys:v3"
}
}
}
],
"category": "vendor",
"name": "CODESYS"
},
{
"branches": [
{
"category": "product_name",
"name": "FESTO CPX",
"product": {
"name": "FESTO CPX",
"product_id": "T032401",
"product_identification_helper": {
"cpe": "cpe:/h:festo:cpx:-"
}
}
}
],
"category": "vendor",
"name": "FESTO"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-47393",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47393"
},
{
"cve": "CVE-2022-47392",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47392"
},
{
"cve": "CVE-2022-47390",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47390"
},
{
"cve": "CVE-2022-47389",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47389"
},
{
"cve": "CVE-2022-47388",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47388"
},
{
"cve": "CVE-2022-47387",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47387"
},
{
"cve": "CVE-2022-47386",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47386"
},
{
"cve": "CVE-2022-47385",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47385"
},
{
"cve": "CVE-2022-47384",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47384"
},
{
"cve": "CVE-2022-47383",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47383"
},
{
"cve": "CVE-2022-47382",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47382"
},
{
"cve": "CVE-2022-47381",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47381"
},
{
"cve": "CVE-2022-47380",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47380"
},
{
"cve": "CVE-2022-47379",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47379"
},
{
"cve": "CVE-2022-47378",
"notes": [
{
"category": "description",
"text": "In Codesys V3 existieren mehrere Schwachstellen. Diese sind auf Fehler bei der Validierung von Eingaben, Out-of-Bounds-Schreibfehler, Buffer-Overflows und fehlerhaften Dereferenzierungen von Zeigern zur\u00fcckzuf\u00fchren. Ein authentisierter Angreifer kann diese Schwachstellen ausnutzen, um Speicher zu \u00fcberschreiben, einen Denial of Service zu verursachen oder Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T032401",
"T032407"
]
},
"release_date": "2023-09-05T22:00:00.000+00:00",
"title": "CVE-2022-47378"
}
]
}
ghsa-h39r-jpx2-j2jx
Vulnerability from github
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
{
"affected": [],
"aliases": [
"CVE-2022-47389"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-05-15T10:15:10Z",
"severity": "HIGH"
},
"details": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.",
"id": "GHSA-h39r-jpx2-j2jx",
"modified": "2024-04-04T05:43:02Z",
"published": "2023-07-06T21:14:57Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47389"
},
{
"type": "WEB",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2023-AVI-0525
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Schneider Electric. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- StruxureWare Data Center Expert versions antérieures à 8.0
- EcoStruxure OPC UA Server Expert versions antérieures à SV2.01 SP2
- Accutech Manager versions antérieures à 2.8
Pour les produits vulnérables listés ci-dessous, en l'attente d'un correctif, l'éditeur recommande d'appliquer un certain nombre de mesures d'atténuation :
- HMISCU Controller
- Modicon Controller LMC078
- Modicon Controller M241
- Modicon Controller M251
- Modicon Controller M262
- Modicon Controller M258
- Modicon Controller LMC058
- Modicon Controller M218
- PacDrive 3 Controllers LMC
- Eco/Pro/Pro2
- SoftSPS embedded in
- EcoStruxure Machine Expert
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eStruxureWare Data Center Expert versions ant\u00e9rieures \u00e0 8.0\u003c/li\u003e \u003cli\u003eEcoStruxure OPC UA Server Expert versions ant\u00e9rieures \u00e0 SV2.01 SP2\u003c/li\u003e \u003cli\u003eAccutech Manager versions ant\u00e9rieures \u00e0 2.8\u003c/li\u003e \u003c/ul\u003e \u003cp\u003ePour les produits vuln\u00e9rables list\u00e9s ci-dessous, en l\u0027attente d\u0027un correctif, l\u0027\u00e9diteur recommande d\u0027appliquer un certain nombre de mesures d\u0027att\u00e9nuation :\u003c/p\u003e \u003cul\u003e \u003cli\u003eHMISCU Controller\u003c/li\u003e \u003cli\u003eModicon Controller LMC078\u003c/li\u003e \u003cli\u003eModicon Controller M241\u003c/li\u003e \u003cli\u003eModicon Controller M251\u003c/li\u003e \u003cli\u003eModicon Controller M262\u003c/li\u003e \u003cli\u003eModicon Controller M258\u003c/li\u003e \u003cli\u003eModicon Controller LMC058\u003c/li\u003e \u003cli\u003eModicon Controller M218\u003c/li\u003e \u003cli\u003ePacDrive 3 Controllers LMC\u003c/li\u003e \u003cli\u003eEco/Pro/Pro2\u003c/li\u003e \u003cli\u003eSoftSPS embedded in\u003c/li\u003e \u003cli\u003eEcoStruxure Machine Expert\u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29414"
},
{
"name": "CVE-2022-47384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47384"
},
{
"name": "CVE-2022-47388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47388"
},
{
"name": "CVE-2022-47379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47379"
},
{
"name": "CVE-2022-47382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47382"
},
{
"name": "CVE-2023-37199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37199"
},
{
"name": "CVE-2022-47378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47378"
},
{
"name": "CVE-2022-47386",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47386"
},
{
"name": "CVE-2022-47389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47389"
},
{
"name": "CVE-2022-47380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47380"
},
{
"name": "CVE-2022-47387",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47387"
},
{
"name": "CVE-2022-47391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47391"
},
{
"name": "CVE-2022-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47383"
},
{
"name": "CVE-2022-47381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47381"
},
{
"name": "CVE-2022-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47393"
},
{
"name": "CVE-2022-47390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47390"
},
{
"name": "CVE-2023-37197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37197"
},
{
"name": "CVE-2022-47392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47392"
},
{
"name": "CVE-2022-47385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47385"
},
{
"name": "CVE-2023-37196",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37196"
},
{
"name": "CVE-2023-37200",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37200"
},
{
"name": "CVE-2023-37198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37198"
}
],
"initial_release_date": "2023-07-11T00:00:00",
"last_revision_date": "2023-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0525",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider Electric. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider Electric",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-02 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-02\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-02.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-03 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-03\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-03.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-04 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-04\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-04.pdf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider Electric SEVD-2023-192-01 du 11 juillet 2023",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-192-01\u0026p_enDocType=Security+and+Safety+Notice\u0026p_File_Name=SEVD-2023-192-01.pdf"
}
]
}
gsd-2022-47389
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-47389",
"id": "GSD-2022-47389"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-47389"
],
"details": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution.",
"id": "GSD-2022-47389",
"modified": "2023-12-13T01:19:36.516410Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"ID": "CVE-2022-47389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS Control RTE (SL)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Control RTE (for Beckhoff CX) SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Control Win (SL)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Control Runtime System Toolkit",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Safety SIL2 Runtime Toolkit",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Safety SIL2 PSP",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS HMI (SL)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Development System V3",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V3.5.19.0"
}
]
}
},
{
"product_name": "CODESYS Control for BeagleBone SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for emPC-A/iMX6 SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for IOT2000 SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for Linux SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for PFC100 SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for PFC200 SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for PLCnext SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for Raspberry Pi SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
},
{
"product_name": "CODESYS Control for WAGO Touch Panels 600 SL",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "V0.0.0.0",
"version_value": "V4.8.0.0"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "Vladimir Tokarev, Microsoft"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution."
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-787",
"lang": "eng",
"value": "CWE-787 Out-of-bounds Write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=",
"refsource": "MISC",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
]
},
"source": {
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.8.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.5.19.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"ID": "CVE-2022-47389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-05-22T19:54Z",
"publishedDate": "2023-05-15T10:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.