2023-06-29 16:00:34 +00:00

124 lines
3.7 KiB
JSON

{
"id": "CVE-2022-32141",
"sourceIdentifier": "info@cert.vde.com",
"published": "2022-06-24T08:15:08.027",
"lastModified": "2023-06-29T14:24:20.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required."
},
{
"lang": "es",
"value": "Diversos productos CODESYS son propensos a una lectura excesiva del buffer. Un atacante remoto poco privilegiado puede dise\u00f1ar una petici\u00f3n con un desplazamiento no v\u00e1lido, que puede causar una sobre lectura del b\u00fafer interno, resultando en una condici\u00f3n de denegaci\u00f3n de servicio. No es requerida una interacci\u00f3n del usuario"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "info@cert.vde.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "info@cert.vde.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.4.7.57",
"matchCriteriaId": "2B26FF87-3FCD-496E-97C5-A1E4F6AACCB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*",
"versionStartIncluding": "2.0",
"versionEndExcluding": "2.4.7.57",
"matchCriteriaId": "CF74E74E-4EF8-4C84-A9A1-612AB7FC88BA"
}
]
}
]
}
],
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=",
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}