Codesys Control For Iot2000
By the Year
In 2024 there have been 0 vulnerabilities in Codesys Control For Iot2000 . Last year Control For Iot2000 had 1 security vulnerability published. Right now, Control For Iot2000 is on track to have less security vulnerabilities in 2024 than it did last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 1 | 8.80 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 4 | 7.58 |
2019 | 6 | 8.32 |
2018 | 0 | 0.00 |
It may take a day or so for new Control For Iot2000 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Codesys Control For Iot2000 Security Vulnerabilities
The CODESYS runtime system in multiple versions
CVE-2018-25048
8.8 - High
- March 23, 2023
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Directory traversal
CODESYS Control runtime system before 3.5.16.10
CVE-2020-15806
7.5 - High
- July 22, 2020
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.
Allocation of Resources Without Limits or Throttling
An issue was discovered in CODESYS Development System before 3.5.16.0
CVE-2020-12068
6.5 - Medium
- May 14, 2020
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.
Improper Privilege Management
CODESYS V3 web server before 3.5.15.40
CVE-2020-10245
9.8 - Critical
- March 26, 2020
CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.
Memory Corruption
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30
CVE-2020-7052
6.5 - Medium
- January 24, 2020
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
Resource Exhaustion
CODESYS 3 web server before 3.5.15.20
CVE-2019-18858
9.8 - Critical
- November 20, 2019
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
Classic Buffer Overflow
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client
CVE-2019-13542
6.5 - Medium
- September 17, 2019
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
NULL Pointer Dereference
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0
CVE-2019-9009
7.5 - High
- September 17, 2019
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.
Improper Handling of Exceptional Conditions
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30
CVE-2019-9008
8.8 - High
- September 17, 2019
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.
Incorrect Permission Assignment for Critical Resource
CODESYS V3 web server, all versions prior to 3.5.14.10
CVE-2019-13532
7.5 - High
- September 13, 2019
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
Directory traversal
CODESYS V3 web server, all versions prior to 3.5.14.10
CVE-2019-13548
9.8 - Critical
- September 13, 2019
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.
Memory Corruption
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Codesys Remote Target Visu Toolkit or by Codesys? Click the Watch button to subscribe.