VDE-2023-024

Vulnerability from csaf_codesysgmbh - Published: 2023-07-28 07:45 - Updated: 2023-07-28 07:45
Summary
CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting
Notes
Impact: Please consult CODESYS Security Advisory 2023-09 for more details.
Remediation: Update CODESYS Development System to version 3.5.17.0 . Update CODESYS Scripting to version 4.1.0.0 . This version can be downloaded and installed directly with the CODESYS Installer. A CODESYS DevelopmentSystem version of 3.5.17.0 is required. Alternatively, you can visit the CODESYS update area for more information on how to obtain the softwareupdate.
Summary: In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.

In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.

CWE-668 - Exposure of Resource to Wrong Sphere
Vendor Fix Update CODESYS Development System to version 3.5.17.0 . Update CODESYS Scripting to version 4.1.0.0 . This version can be downloaded and installed directly with the CODESYS Installer. A CODESYS DevelopmentSystem version of 3.5.17.0 is required. Alternatively, you can visit the CODESYS update area for more information on how to obtain the softwareupdate.
Acknowledgments
CERT@VDE certvde.com
Trend Micro Zero Day Initiative
Summoning Team Sina Kheirkhah

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      },
      {
        "organization": "Trend Micro Zero Day Initiative",
        "summary": "reporting"
      },
      {
        "names": [
          "Sina Kheirkhah"
        ],
        "organization": "Summoning Team",
        "summary": "Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative for reporting"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "description",
        "text": "Please consult CODESYS Security Advisory 2023-09\u00a0for more details.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "Update CODESYS Development System to version 3.5.17.0 .\n\nUpdate CODESYS Scripting to version 4.1.0.0 .\n\nThis version can be downloaded and installed directly with the CODESYS Installer. \nA CODESYS DevelopmentSystem version of 3.5.17.0 is required. \n\nAlternatively, you can visit the CODESYS update area for more information on how to obtain the softwareupdate.",
        "title": "Remediation"
      },
      {
        "category": "summary",
        "text": "\nIn CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.",
        "title": "Summary"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "security@codesys.com",
      "name": "CODESYS GmbH",
      "namespace": "https://www.codesys.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "VDE-2023-024: CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2023-024/"
      },
      {
        "category": "self",
        "summary": "VDE-2023-024: CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting - CSAF",
        "url": "https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-024.json"
      },
      {
        "category": "external",
        "summary": "Vendor PSIRT",
        "url": "https://www.codesys.com"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for CODESYS GmbH",
        "url": "https://certvde.com/en/advisories/vendor/codesys/"
      }
    ],
    "title": "CODESYS: Vulnerability in CODESYS Development System and CODESYS Scripting",
    "tracking": {
      "aliases": [
        "VDE-2023-024"
      ],
      "current_release_date": "2023-07-28T07:45:00.000Z",
      "generator": {
        "date": "2025-06-25T05:46:38.448Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.28"
        }
      },
      "id": "VDE-2023-024",
      "initial_release_date": "2023-07-28T07:45:00.000Z",
      "revision_history": [
        {
          "date": "2023-07-28T07:45:00.000Z",
          "number": "1.0.0",
          "summary": "Initial revision."
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CODESYS Development System",
                "product": {
                  "name": "CODESYS Development System",
                  "product_id": "CSAFPID-11001"
                }
              },
              {
                "category": "product_name",
                "name": "CODESYS Scripting",
                "product": {
                  "name": "CODESYS Scripting",
                  "product_id": "CSAFPID-11002"
                }
              }
            ],
            "category": "product_family",
            "name": "Hardware"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "3.5.9.0\u003c3.5.17.0",
                "product": {
                  "name": "Firmware 3.5.9.0\u003c3.5.17.0",
                  "product_id": "CSAFPID-21001"
                }
              },
              {
                "category": "product_version_range",
                "name": "4.0.0.0\u003c4.1.0.0",
                "product": {
                  "name": "Firmware 4.0.0.0\u003c4.1.0.0",
                  "product_id": "CSAFPID-21002"
                }
              },
              {
                "category": "product_version",
                "name": "3.5.17.0",
                "product": {
                  "name": "Firmware 3.5.17.0",
                  "product_id": "CSAFPID-22001"
                }
              },
              {
                "category": "product_version",
                "name": "4.1.0.0",
                "product": {
                  "name": "Firmware 4.1.0.0",
                  "product_id": "CSAFPID-22002"
                }
              }
            ],
            "category": "product_family",
            "name": "Firmware"
          }
        ],
        "category": "vendor",
        "name": "CODESYS"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-31001",
          "CSAFPID-31002"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-32001",
          "CSAFPID-32002"
        ],
        "summary": "Fixed products."
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 3.5.9.0\u003c3.5.17.0 installed on CODESYS Development System",
          "product_id": "CSAFPID-31001"
        },
        "product_reference": "CSAFPID-21001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 4.0.0.0\u003c4.1.0.0 installed on CODESYS Scripting",
          "product_id": "CSAFPID-31002"
        },
        "product_reference": "CSAFPID-21002",
        "relates_to_product_reference": "CSAFPID-11002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 3.5.17.0 installed on CODESYS Development System",
          "product_id": "CSAFPID-32001"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware 4.1.0.0 installed on CODESYS Scripting",
          "product_id": "CSAFPID-32002"
        },
        "product_reference": "CSAFPID-22002",
        "relates_to_product_reference": "CSAFPID-11002"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-3670",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "description",
          "text": "In CODESYS Development System 3.5.9.0 to\u00a03.5.17.0 and\u00a0CODESYS Scripting\u00a04.0.0.0 to\u00a04.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-32001",
          "CSAFPID-32002"
        ],
        "known_affected": [
          "CSAFPID-31001",
          "CSAFPID-31002"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Update CODESYS Development System to version 3.5.17.0 .\n\nUpdate CODESYS Scripting to version 4.1.0.0 .\n\nThis version can be downloaded and installed directly with the CODESYS Installer. \nA CODESYS DevelopmentSystem version of 3.5.17.0 is required. \n\nAlternatively, you can visit the CODESYS update area for more information on how to obtain the softwareupdate.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.3,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.3,
            "temporalSeverity": "HIGH",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-31001",
            "CSAFPID-31002"
          ]
        }
      ],
      "title": "CVE-2023-3670"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…