Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-13542 (GCVE-0-2019-13542)
Vulnerability from cvelistv5
- CWE-476 - NULL POINTER DEREFERENCE
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-19-255-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-19-255-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | ||
---|---|---|---|---|
GmbH | 3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server |
Version: all versions 3.5.11.0 to 3.5.15.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:57:39.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server", "vendor": "GmbH", "versions": [ { "status": "affected", "version": "all versions 3.5.11.0 to 3.5.15.0" } ] } ], "descriptions": [ { "lang": "en", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "NULL POINTER DEREFERENCE CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-17T18:56:45", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-13542", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server", "version": { "version_data": [ { "version_value": "all versions 3.5.11.0 to 3.5.15.0" } ] } } ] }, "vendor_name": "GmbH" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL POINTER DEREFERENCE CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2019-13542", "datePublished": "2019-09-17T18:56:45", "dateReserved": "2019-07-11T00:00:00", "dateUpdated": "2024-08-04T23:57:39.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-13542\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2019-09-17T19:15:10.757\",\"lastModified\":\"2024-11-21T04:25:06.737\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.\"},{\"lang\":\"es\",\"value\":\"3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, todas las versiones desde 3.5.11.0 hasta 3.5.15.0, permite a un atacante enviar peticiones dise\u00f1adas desde un cliente OPC UA confiable que causa una desreferencia del puntero NULL, lo que puede desencadenar una condici\u00f3n de denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"71439C06-3F84-4AC4-AC41-4E0AB9AC210C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_empc-a\\\\/imx6:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"11BD175F-8CBB-45A0-870D-E56E6B57FBB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"2EA5147D-D5AB-4352-95EE-0D90C80781B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"45DBEFC0-1336-4170-8EA7-A6871AC505CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"1C5F1F99-93B3-4F16-B864-023F956601FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"2AF22400-3C26-4D90-AC04-FCAC171EE435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"67E16675-C26E-43C4-9140-CCA4E466C693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"E32E1F58-72F8-410B-A8C3-7E8DEA67D4A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:linux:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"40343F22-A7DB-4EFF-A58C-957128A7AC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:runtime_system_toolkit:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.11.0\",\"versionEndExcluding\":\"3.5.15.0\",\"matchCriteriaId\":\"CC74338D-F093-4D49-B56D-3EF17232F98A\"}]}]}],\"references\":[{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-255-04\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.us-cert.gov/ics/advisories/icsa-19-255-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
ICSA-19-255-04
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "3S-Smart Software Solutions GmbH", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-255-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-255-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-255-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-255-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server", "tracking": { "current_release_date": "2019-09-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-255-04", "initial_release_date": "2019-09-12T00:00:00.000000Z", "revision_history": [ { "date": "2019-09-12T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-255-04 3S-Smart Solutions GmbH CODESYS Control V3 OPC UA Server" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control RTE V3 (for Beckhoff CX): all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CODESYS Control RTE V3 (for Beckhoff CX)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for BeagleBone: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CODESYS Control for BeagleBone" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for PFC200: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CODESYS Control for PFC200" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for emPC-A/iMX6: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CODESYS Control for emPC-A/iMX6" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for Raspberry Pi: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "CODESYS Control for Raspberry Pi" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for PFC100: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "CODESYS Control for PFC100" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control RTE V3: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CODESYS Control RTE V3" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for IOT2000: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "CODESYS Control for IOT2000" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control Win V3 (also part of the CODESYS Development System setup): all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "CODESYS Control Win V3 (also part of the CODESYS Development System setup)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control V3 Runtime System Toolkit: all versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "CODESYS Control V3 Runtime System Toolkit" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for Linux: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "CODESYS Control for Linux" } ], "category": "vendor", "name": "3S-Smart Software Solutions GmbH" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13542", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Sending specific crafted requests from a trusted OPC UA client may cause a NULL pointer dereference, which may trigger a denial-of-service condition.CVE-2019-13542 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13542" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "3S-Smart Software Solutions GmbH has released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Please visit the CODESYS update page for more information on how to obtain the software update: https://www.codesys.com/download/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://www.codesys.com/download/" }, { "category": "mitigation", "details": "Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Use firewalls to protect and separate the control system network from other networks.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Use VPN (virtual private networks) tunnels if remote access is required.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Activate and apply user management and password features.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Limit the access to both development and control system by physical means, operating system features, etc.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Protect both development and control system by using up to date virus detecting solutions. For more information and general recommendations for protecting machines and plants, see also the CODESYS security whitepaper at https://customers.codesys.com/fileadmin/data/customers/security/CODESYS-Security-Whitepaper.pdf", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://customers.codesys.com/fileadmin/data/customers/security/CODESYS-Security-Whitepaper.pdf" }, { "category": "mitigation", "details": "For more information, 3S-Smart Software Solutions GmbH has released a security report that can be viewed at the following link:https://www.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-07_CDS-65080.pdf", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://www.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-07_CDS-65080.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] } ] } ] }
icsa-19-255-04
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "3S-Smart Software Solutions GmbH", "summary": "reporting this vulnerability to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of this vulnerability could cause a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target this vulnerability.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-19-255-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2019/icsa-19-255-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-19-255-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-255-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.us-cert.gov/ics/tips/ICS-TIP-12-146-01B" } ], "title": "3S-Smart Software Solutions GmbH CODESYS Control V3 OPC UA Server", "tracking": { "current_release_date": "2019-09-12T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-19-255-04", "initial_release_date": "2019-09-12T00:00:00.000000Z", "revision_history": [ { "date": "2019-09-12T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-19-255-04 3S-Smart Solutions GmbH CODESYS Control V3 OPC UA Server" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control RTE V3 (for Beckhoff CX): all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "CODESYS Control RTE V3 (for Beckhoff CX)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for BeagleBone: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "CODESYS Control for BeagleBone" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for PFC200: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "CODESYS Control for PFC200" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for emPC-A/iMX6: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "CODESYS Control for emPC-A/iMX6" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for Raspberry Pi: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "CODESYS Control for Raspberry Pi" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for PFC100: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "CODESYS Control for PFC100" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control RTE V3: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "CODESYS Control RTE V3" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for IOT2000: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "CODESYS Control for IOT2000" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control Win V3 (also part of the CODESYS Development System setup): all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "CODESYS Control Win V3 (also part of the CODESYS Development System setup)" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control V3 Runtime System Toolkit: all versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "CODESYS Control V3 Runtime System Toolkit" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 3.5.11.0 | \u003c= 3.5.15.0", "product": { "name": "CODESYS Control for Linux: all Versions 3.5.11.0 to 3.5.15.0", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "CODESYS Control for Linux" } ], "category": "vendor", "name": "3S-Smart Software Solutions GmbH" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-13542", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "Sending specific crafted requests from a trusted OPC UA client may cause a NULL pointer dereference, which may trigger a denial-of-service condition.CVE-2019-13542 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13542" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "3S-Smart Software Solutions GmbH has released Version 3.5.15.0 to resolve this vulnerability for all affected CODESYS products.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Please visit the CODESYS update page for more information on how to obtain the software update: https://www.codesys.com/download/", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://www.codesys.com/download/" }, { "category": "mitigation", "details": "Use controllers and devices only in a protected environment to minimize network exposure and ensure that they are not accessible from outside.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Use firewalls to protect and separate the control system network from other networks.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Use VPN (virtual private networks) tunnels if remote access is required.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Activate and apply user management and password features.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Limit the access to both development and control system by physical means, operating system features, etc.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] }, { "category": "mitigation", "details": "Protect both development and control system by using up to date virus detecting solutions. For more information and general recommendations for protecting machines and plants, see also the CODESYS security whitepaper at https://customers.codesys.com/fileadmin/data/customers/security/CODESYS-Security-Whitepaper.pdf", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://customers.codesys.com/fileadmin/data/customers/security/CODESYS-Security-Whitepaper.pdf" }, { "category": "mitigation", "details": "For more information, 3S-Smart Software Solutions GmbH has released a security report that can be viewed at the following link:https://www.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-07_CDS-65080.pdf", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ], "url": "https://www.codesys.com/fileadmin/data/customers/security/2019/Advisory2019-07_CDS-65080.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011" ] } ] } ] }
cnvd-2019-32460
Vulnerability from cnvd
Title: 3S-Smart Software Solutions CODESYS Control代码问题漏洞
Description:
3S-Smart Software Solutions CODESYS Control是德国3S-Smart Software Solutions公司的一套工业控制程序编程软件。
3S-Smart Software Solutions CODESYS Control中存在代码问题漏洞,攻击者可利用该漏洞导致拒绝服务。
Severity: 中
Patch Name: 3S-Smart Software Solutions CODESYS Control代码问题漏洞的补丁
Patch Description:
3S-Smart Software Solutions CODESYS Control是德国3S-Smart Software Solutions公司的一套工业控制程序编程软件。
3S-Smart Software Solutions CODESYS Control中存在代码问题漏洞,攻击者可利用该漏洞导致拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://www.codesys.com/
Reference: https://www.auscert.org.au/bulletins/ESB-2019.3487/ https://www.us-cert.gov/ics/advisories/icsa-19-255-04
Name | ['3S-Smart Software Solutions CODESYS Control for BeagleBone >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for emPC-A/iMX >=6 3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for IOT2000 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for Linux >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for PFC100 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for PFC200 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control for Raspberry Pi >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control RTE V3 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control RTE V3 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control Win V3 >=3.5.11.0,<=3.5.15.0', '3S-Smart Software Solutions CODESYS Control V3 Runtime System Toolkit >=3.5.11.0,<=3.5.15.0'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-13542" } }, "description": "3S-Smart Software Solutions CODESYS Control\u662f\u5fb7\u56fd3S-Smart Software Solutions\u516c\u53f8\u7684\u4e00\u5957\u5de5\u4e1a\u63a7\u5236\u7a0b\u5e8f\u7f16\u7a0b\u8f6f\u4ef6\u3002\n\n3S-Smart Software Solutions CODESYS Control\u4e2d\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "discovererName": "GmbH", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.codesys.com/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-32460", "openTime": "2019-09-21", "patchDescription": "3S-Smart Software Solutions CODESYS Control\u662f\u5fb7\u56fd3S-Smart Software Solutions\u516c\u53f8\u7684\u4e00\u5957\u5de5\u4e1a\u63a7\u5236\u7a0b\u5e8f\u7f16\u7a0b\u8f6f\u4ef6\u3002\r\n\r\n3S-Smart Software Solutions CODESYS Control\u4e2d\u5b58\u5728\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "3S-Smart Software Solutions CODESYS Control\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "3S-Smart Software Solutions CODESYS Control for BeagleBone \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for emPC-A/iMX \u003e=6 3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for IOT2000 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for Linux \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for PFC100 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for PFC200 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control for Raspberry Pi \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control RTE V3 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control RTE V3 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control Win V3 \u003e=3.5.11.0\uff0c\u003c=3.5.15.0", "3S-Smart Software Solutions CODESYS Control V3 Runtime System Toolkit \u003e=3.5.11.0\uff0c\u003c=3.5.15.0" ] }, "referenceLink": "https://www.auscert.org.au/bulletins/ESB-2019.3487/\r\nhttps://www.us-cert.gov/ics/advisories/icsa-19-255-04", "serverity": "\u4e2d", "submitTime": "2019-09-17", "title": "3S-Smart Software Solutions CODESYS Control\u4ee3\u7801\u95ee\u9898\u6f0f\u6d1e" }
gsd-2019-13542
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-13542", "description": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.", "id": "GSD-2019-13542" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-13542" ], "details": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.", "id": "GSD-2019-13542", "modified": "2023-12-13T01:23:41.761784Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-13542", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server", "version": { "version_data": [ { "version_value": "all versions 3.5.11.0 to 3.5.15.0" } ] } } ] }, "vendor_name": "GmbH" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NULL POINTER DEREFERENCE CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:runtime_system_toolkit:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2019-13542" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04", "refsource": "MISC", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-09T23:46Z", "publishedDate": "2019-09-17T19:15Z" } } }
ghsa-87r9-pj76-c2hq
Vulnerability from github
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
{ "affected": [], "aliases": [ "CVE-2019-13542" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-09-17T19:15:00Z", "severity": "MODERATE" }, "details": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.", "id": "GHSA-87r9-pj76-c2hq", "modified": "2024-04-04T01:57:56Z", "published": "2022-05-24T16:56:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13542" }, { "type": "WEB", "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
var-201909-1000
Vulnerability from variot
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition. 3S-Smart Software Solutions CODESYS Control is a set of industrial control program programming software from Germany 3S-Smart Software Solutions. A code issue vulnerability exists in 3S-Smart Software Solutions CODESYS Control. The vulnerability originates from improper design or implementation during code development of a network system or product. The following products and versions are affected: CODESYS Control for BeagleBone 3.5.11.0 to 3.5.15.0, CODESYS Control for emPC-A / iMX6 3.5.11.0 to 3.5.15.0, and CODESYS Control for IOT2000 3.5.11.0 to 3.5. Version 15.0, CODESYS Control for Linux 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC100 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC200 3.5.11.0 to 3.5.15.0, CODESYS Control for Raspberry Pi Version 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0 (for Beckhoff CX), CODESYS Control Win V3 3.5.11.0 Version to 3.5.15.0 (also part of CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit version 3.5.11.0 to 3.5.15.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-1000", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "software solutions codesys control rte", "scope": "eq", "trust": 1.2, "vendor": "3s smart", "version": "v3\u003e=3.5.11.0,\u003c=3.5.15.0" }, { "model": "control for pfc100", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for empc-a\\/imx6", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for pfc100", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control win", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control win", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for iot2000", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for iot2000", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control for empc-a\\/imx6", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control for beaglebone", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "linux", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control for pfc200", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control rte", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control rte", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "runtime system toolkit", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "control for beaglebone", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "linux", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for pfc200", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "runtime system toolkit", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for raspberry pi", "scope": "gte", "trust": 1.0, "vendor": "codesys", "version": "3.5.11.0" }, { "model": "control for raspberry pi", "scope": "lt", "trust": 1.0, "vendor": "codesys", "version": "3.5.15.0" }, { "model": "codesys control for beaglebone", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for empc-a/imx6", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for iot2000", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for linux", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for pfc100", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for pfc200", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control for raspberry pi", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control rte v3", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control runtime system toolkit", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "codesys control win sl", "scope": "eq", "trust": 0.8, "vendor": "3s smart", "version": "3.5.11.0 to 3.5.15.0" }, { "model": "software solutions codesys control for beaglebone", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for empc-a/imx", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "63.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for iot2000", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for linux", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for pfc100", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for pfc200", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control for raspberry pi", "scope": "gte", "trust": 0.6, "vendor": "3s smart", "version": "3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control win", "scope": "eq", "trust": 0.6, "vendor": "3s smart", "version": "v3\u003e=3.5.11.0,\u003c=3.5.15.0" }, { "model": "software solutions codesys control runtime system toolkit", "scope": "eq", "trust": 0.6, "vendor": "3s smart", "version": "v3\u003e=3.5.11.0,\u003c=3.5.15.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for beaglebone", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for empc a imx6", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for iot2000", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for pfc100", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for pfc200", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control for raspberry pi", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control rte", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "control win", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "linux", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "runtime system toolkit", "version": "*" } ], "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:codesys:control_for_beaglebone_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_empc-a%2fimx6_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_iot2000_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_linux_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_pfc100_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_pfc200_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_for_raspberry_pi_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_rte_sl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:runtime_system_toolkit", "vulnerable": true }, { "cpe22Uri": "cpe:/a:codesys:control_win_sl", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009520" } ] }, "cve": "CVE-2019-13542", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2019-13542", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2019-32460", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "0388bd06-7396-4425-9011-862e9649841c", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2019-13542", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-13542", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-13542", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-13542", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2019-32460", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201909-656", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNNVD", "id": "CNNVD-201909-656" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition. 3S-Smart Software Solutions CODESYS Control is a set of industrial control program programming software from Germany 3S-Smart Software Solutions. \nA code issue vulnerability exists in 3S-Smart Software Solutions CODESYS Control. The vulnerability originates from improper design or implementation during code development of a network system or product. The following products and versions are affected: CODESYS Control for BeagleBone 3.5.11.0 to 3.5.15.0, CODESYS Control for emPC-A / iMX6 3.5.11.0 to 3.5.15.0, and CODESYS Control for IOT2000 3.5.11.0 to 3.5. Version 15.0, CODESYS Control for Linux 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC100 3.5.11.0 to 3.5.15.0, CODESYS Control for PFC200 3.5.11.0 to 3.5.15.0, CODESYS Control for Raspberry Pi Version 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0, CODESYS Control RTE V3 3.5.11.0 to 3.5.15.0 (for Beckhoff CX), CODESYS Control Win V3 3.5.11.0 Version to 3.5.15.0 (also part of CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit version 3.5.11.0 to 3.5.15.0", "sources": [ { "db": "NVD", "id": "CVE-2019-13542" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "CNNVD", "id": "CNNVD-201909-656" }, { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-13542", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-19-255-04", "trust": 3.0 }, { "db": "AUSCERT", "id": "ESB-2019.3487", "trust": 1.2 }, { "db": "CNVD", "id": "CNVD-2019-32460", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-656", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-009520", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-19-255-03", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-255-05", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-255-02", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-19-255-01", "trust": 0.6 }, { "db": "IVD", "id": "0388BD06-7396-4425-9011-862E9649841C", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNNVD", "id": "CNNVD-201909-656" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "id": "VAR-201909-1000", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" } ], "trust": 1.8 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" } ] }, "last_update_date": "2024-11-23T22:05:59.611000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.codesys.com/" }, { "title": "3S-Smart Software Solutions CODESYS Control Code Issue Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/181473" }, { "title": "CODESYS Control V3 runtime systems Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98230" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNNVD", "id": "CNNVD-201909-656" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13542" }, { "trust": 1.2, "url": "https://www.auscert.org.au/bulletins/esb-2019.3487/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-13542" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-05" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-03" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-02" }, { "trust": 0.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-01" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNNVD", "id": "CNNVD-201909-656" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" }, { "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "db": "CNNVD", "id": "CNNVD-201909-656" }, { "db": "NVD", "id": "CVE-2019-13542" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32460" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "date": "2019-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-656" }, { "date": "2019-09-17T19:15:10.757000", "db": "NVD", "id": "CVE-2019-13542" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-32460" }, { "date": "2019-09-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009520" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-656" }, { "date": "2024-11-21T04:25:06.737000", "db": "NVD", "id": "CVE-2019-13542" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-656" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "3S-Smart Software Solutions CODESYS Control Code Issue Vulnerability", "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNVD", "id": "CNVD-2019-32460" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Code problem", "sources": [ { "db": "IVD", "id": "0388bd06-7396-4425-9011-862e9649841c" }, { "db": "CNNVD", "id": "CNNVD-201909-656" } ], "trust": 0.8 } }
fkie_cve-2019-13542
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.us-cert.gov/ics/advisories/icsa-19-255-04 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-19-255-04 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
codesys | control_for_beaglebone | * | |
codesys | control_for_empc-a\/imx6 | * | |
codesys | control_for_iot2000 | * | |
codesys | control_for_pfc100 | * | |
codesys | control_for_pfc200 | * | |
codesys | control_for_raspberry_pi | * | |
codesys | control_rte | * | |
codesys | control_win | * | |
codesys | linux | * | |
codesys | runtime_system_toolkit | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*", "matchCriteriaId": "71439C06-3F84-4AC4-AC41-4E0AB9AC210C", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*", "matchCriteriaId": "11BD175F-8CBB-45A0-870D-E56E6B57FBB2", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EA5147D-D5AB-4352-95EE-0D90C80781B5", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*", "matchCriteriaId": "45DBEFC0-1336-4170-8EA7-A6871AC505CD", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C5F1F99-93B3-4F16-B864-023F956601FF", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AF22400-3C26-4D90-AC04-FCAC171EE435", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*", "matchCriteriaId": "67E16675-C26E-43C4-9140-CCA4E466C693", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*", "matchCriteriaId": "E32E1F58-72F8-410B-A8C3-7E8DEA67D4A3", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "40343F22-A7DB-4EFF-A58C-957128A7AC96", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:codesys:runtime_system_toolkit:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC74338D-F093-4D49-B56D-3EF17232F98A", "versionEndExcluding": "3.5.15.0", "versionStartIncluding": "3.5.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition." }, { "lang": "es", "value": "3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, todas las versiones desde 3.5.11.0 hasta 3.5.15.0, permite a un atacante enviar peticiones dise\u00f1adas desde un cliente OPC UA confiable que causa una desreferencia del puntero NULL, lo que puede desencadenar una condici\u00f3n de denegaci\u00f3n de servicio." } ], "id": "CVE-2019-13542", "lastModified": "2024-11-21T04:25:06.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-17T19:15:10.757", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-19-255-04" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.