2023-05-15 14:00:26 +02:00
{
"id" : "CVE-2022-47384" ,
"sourceIdentifier" : "info@cert.vde.com" ,
"published" : "2023-05-15T10:15:09.863" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:31:52.427" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-05-15 14:00:26 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead\u00a0to a denial-of-service condition, memory overwriting, or remote code execution."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-05-15 14:00:26 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-05-15 14:00:26 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "info@cert.vde.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-05-15 14:00:26 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
2023-05-22 20:00:39 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "523FC1D5-2A13-4B4D-9EE6-7895A955F631"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "6E4DDA5F-C7CD-4ADE-AE44-B2F2C2F6B61C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "968E3873-9D42-4516-B884-56D49BB8BE8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "8FD4E051-A23A-4214-A599-5EDFD40B4843"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "27B2E352-6ACE-4F3D-B462-4DE1197DAF04"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "3F20DC27-C98B-49CF-9C39-9FB483438FD4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "80A1AAE3-1A29-4B1E-8C50-0EA87D158371"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "9C58C0EB-17CF-4ACA-B691-BBB558A77B4F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "3.5.19.0" ,
"matchCriteriaId" : "00007AE1-3679-4D05-96E2-F0F45E73B2B1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "44E6A757-BB46-467E-B0DD-916672995584"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "C74B30D2-2653-4D2A-BEEC-0AB1843097AB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "A9CF7388-0541-4CEA-B83B-127466DA6635"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "0D2297BF-E19B-4FA6-841F-0D5915D345CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "BBAA2041-8C65-4CC5-AC77-45DE2DEA458F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "A2F76A22-9A91-4683-8F85-322E2AA00E28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "B37C6669-08B9-4588-B871-3203E8ABFCE9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.8.0.0" ,
"matchCriteriaId" : "B4E932B1-1475-40A0-AF58-D4F643A6A850"
}
]
}
]
}
] ,
2023-05-15 14:00:26 +02:00
"references" : [
{
"url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=" ,
2023-05-22 20:00:39 +00:00
"source" : "info@cert.vde.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-05-15 14:00:26 +02:00
}
]
}