Codesys Gateway
By the Year
In 2024 there have been 0 vulnerabilities in Codesys Gateway . Gateway did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 0 | 0.00 |
2023 | 0 | 0.00 |
2022 | 9 | 7.36 |
2021 | 3 | 7.43 |
2020 | 1 | 6.50 |
2019 | 5 | 7.96 |
2018 | 0 | 0.00 |
It may take a day or so for new Gateway vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Codesys Gateway Security Vulnerabilities
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption
CVE-2022-30791
7.5 - High
- July 11, 2022
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
Resource Exhaustion
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption
CVE-2022-30792
7.5 - High
- July 11, 2022
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
Resource Exhaustion
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
CVE-2022-31805
7.5 - High
- June 24, 2022
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
Unprotected Transport of Credentials
In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password
CVE-2022-31802
9.8 - Critical
- June 24, 2022
In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password.
Partial String Comparison
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections
CVE-2022-31803
5.3 - Medium
- June 24, 2022
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.
Resource Exhaustion
The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits
CVE-2022-31804
7.5 - High
- June 24, 2022
The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.
Stack Exhaustion
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products
CVE-2022-22513
6.5 - Medium
- April 07, 2022
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
NULL Pointer Dereference
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request
CVE-2022-22514
7.1 - High
- April 07, 2022
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
Untrusted Pointer Dereference
An unauthenticated, remote attacker
CVE-2022-22517
7.5 - High
- April 07, 2022
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Use of Insufficiently Random Values
In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference
CVE-2021-36764
7.5 - High
- August 04, 2021
In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.
NULL Pointer Dereference
CODESYS Control Runtime system before 3.5.17.0 has improper input validation
CVE-2021-29242
7.3 - High
- May 03, 2021
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Improper Input Validation
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference
CVE-2021-29241
7.5 - High
- May 03, 2021
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).
NULL Pointer Dereference
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30
CVE-2020-7052
6.5 - Medium
- January 24, 2020
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
Resource Exhaustion
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0
CVE-2019-9009
7.5 - High
- September 17, 2019
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.
Improper Handling of Exceptional Conditions
An issue was discovered in 3S-Smart CODESYS V3 products
CVE-2019-9012
7.5 - High
- August 15, 2019
An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.
Allocation of Resources Without Limits or Throttling
An issue was discovered in 3S-Smart CODESYS V3 products
CVE-2019-9010
9.8 - Critical
- August 15, 2019
An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
CVE-2018-20026
7.5 - High
- February 19, 2019
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
CVE-2018-20025
7.5 - High
- February 19, 2019
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
Use of Insufficiently Random Values
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Codesys Safety Sil2 or by Codesys? Click the Watch button to subscribe.