Control For Iot2000 Codesys Control For Iot2000

Do you want an email whenever new security vulnerabilities are reported in Codesys Control For Iot2000?

By the Year

In 2024 there have been 0 vulnerabilities in Codesys Control For Iot2000 . Last year Control For Iot2000 had 1 security vulnerability published. Right now, Control For Iot2000 is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 8.80
2022 0 0.00
2021 0 0.00
2020 4 7.58
2019 6 8.32
2018 0 0.00

It may take a day or so for new Control For Iot2000 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Codesys Control For Iot2000 Security Vulnerabilities

The CODESYS runtime system in multiple versions

CVE-2018-25048 8.8 - High - March 23, 2023

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

Directory traversal

CODESYS Control runtime system before 3.5.16.10

CVE-2020-15806 7.5 - High - July 22, 2020

CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.

Allocation of Resources Without Limits or Throttling

An issue was discovered in CODESYS Development System before 3.5.16.0

CVE-2020-12068 6.5 - Medium - May 14, 2020

An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.

Improper Privilege Management

CODESYS V3 web server before 3.5.15.40

CVE-2020-10245 9.8 - Critical - March 26, 2020

CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.

Memory Corruption

CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30

CVE-2020-7052 6.5 - Medium - January 24, 2020

CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.

Resource Exhaustion

CODESYS 3 web server before 3.5.15.20

CVE-2019-18858 9.8 - Critical - November 20, 2019

CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.

Classic Buffer Overflow

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client

CVE-2019-13542 6.5 - Medium - September 17, 2019

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.

NULL Pointer Dereference

An issue was discovered in 3S-Smart CODESYS before 3.5.15.0

CVE-2019-9009 7.5 - High - September 17, 2019

An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.

Improper Handling of Exceptional Conditions

An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30

CVE-2019-9008 8.8 - High - September 17, 2019

An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.

Incorrect Permission Assignment for Critical Resource

CODESYS V3 web server, all versions prior to 3.5.14.10

CVE-2019-13532 7.5 - High - September 13, 2019

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.

Directory traversal

CODESYS V3 web server, all versions prior to 3.5.14.10

CVE-2019-13548 9.8 - Critical - September 13, 2019

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

Memory Corruption

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Codesys Remote Target Visu Toolkit or by Codesys? Click the Watch button to subscribe.

Codesys
Vendor

subscribe