cve-2022-4224
Vulnerability from cvelistv5
Published
2023-03-23 11:15
Modified
2024-08-03 01:34
Severity ?
EPSS score ?
Summary
In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | CODESYS | Control RTE (SL) |
Version: 3.0.0.0 < 3.5.19.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T01:34:49.591Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Control RTE (SL) ", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control RTE (for Beckhoff CX) SL", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control Win (SL)", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: " Runtime Toolkit ", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Safety SIL2 Runtime Toolkit", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Safety SIL2 PSP", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "HMI (SL) ", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Development System V3", vendor: "CODESYS", versions: [ { lessThan: "3.5.19.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: " Control for BeagleBone SL ", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for emPC-A/iMX6 SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for IOT2000 SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for Linux SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: " Control for PFC100 SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: " Control for PFC200 SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for PLCnext SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for Raspberry Pi SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "Control for WAGO Touch Panels 600 SL", vendor: "CODESYS", versions: [ { lessThan: "4.8.0.0", status: "affected", version: "3.0.0.0", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Franklin Zhao from ELEX FEIGONG RESEARCH INSTITUTE of Elex CyberSecurity", }, { lang: "en", type: "finder", user: "00000000-0000-4000-9000-000000000000", value: "Reid Wightman of Dragos", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.", }, ], value: "In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-1188", description: "CWE-1188 Insecure Default Initialization of Resource", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-08-09T10:47:13.144Z", orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c", shortName: "CERTVDE", }, references: [ { url: "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=", }, ], source: { defect: [ "CERT@VDE#64318", ], discovery: "EXTERNAL", }, title: "CODESYS: Exposure of Resource to Wrong Sphere in CODESYS V3", x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c", assignerShortName: "CERTVDE", cveId: "CVE-2022-4224", datePublished: "2023-03-23T11:15:37.014Z", dateReserved: "2022-11-30T06:54:13.183Z", dateUpdated: "2024-08-03T01:34:49.591Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2022-4224\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2023-03-23T12:15:12.990\",\"lastModified\":\"2024-11-21T07:34:49.520\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"40CAED29-E204-459D-8AFC-F814E68FAB9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_empc-a\\\\/imx6_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"C5E9691E-E67A-4D59-9152-3731DD381CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"A5FC8BEB-DB37-4486-BAFD-16B82F331F9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"D2821B72-748A-4B3E-BD8B-E55C92A1A166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"680C2604-3774-43D2-9DDE-38A0F593BFF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"D4B2CB47-68F3-4C17-8D61-88F655CF19ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"6E3514C8-F513-4576-8F6D-DDB193E3B947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"5059640A-05F0-4D59-9682-BC09F155527C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"D7D13CFF-F753-430B-9E03-F3F24066B529\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"C27B4D20-FDE3-4003-97BD-F43EE147AD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_sl_\\\\(for_beckhoff_cx\\\\):*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"63A8AFF5-3CC8-43FA-A9D3-A6A53FAF15FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"A1A44FED-CFBB-454A-B8E8-FC11A996488F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"8297903A-80E1-4FA7-B552-672B94B6B6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"57C60464-F6BB-431A-AD96-32B07FD99948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"0032B82B-21B9-4006-A7E4-CD5B92962136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"B7181873-775F-43A6-BDBB-DBB2879C7D4D\"}]}]}],\"references\":[{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.