
CVE-2022-32137 – CODESYS Runtime System prone to heap based buffer overflow
https://notcve.org/view.php?id=CVE-2022-32137
24 Jun 2022 — In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required. En diversos productos de CODESYS, un atacante remoto poco privilegiado puede diseñar una petición que puede causar un desbordamiento de búfer en la región heap de la memoria, resultando en una condición de negación de servicio o sobreescritura de memoria. No es requerida una interacc... • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= • CWE-122: Heap-based Buffer Overflow •

CVE-2022-32136 – Codesys runtime systems: Access of uninitialised pointer lead to denial of service.
https://notcve.org/view.php?id=CVE-2022-32136
24 Jun 2022 — In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required. En varios productos CODESYS, un atacante remoto poco privilegiado puede diseñar una petición que cause un acceso de lectura a un puntero no inicializado, resultando en una denegación de servicio. No es requerida una interacción del usuario • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= • CWE-824: Access of Uninitialized Pointer •

CVE-2022-31806 – Insecure default settings in CODESYS Runtime Toolkit 32 bit full and CODESYS PLCWinNT
https://notcve.org/view.php?id=CVE-2022-31806
24 Jun 2022 — In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller. En CODESYS V2 PLCWinNT y Runtime Toolkit 32 en versiones anteriores a V2.4.7.57, la protección por contraseña no está habilitada por defecto y no se presenta información o aviso para habilitar la protección por contraseña en el inicio de sesión en caso de que no sea... • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= • CWE-1188: Initialization of a Resource with an Insecure Default •

CVE-2022-31805 – Insecure transmission of credentials
https://notcve.org/view.php?id=CVE-2022-31805
24 Jun 2022 — In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. En CODESYS Development System, varios componentes en diversos versiones transmiten las contraseñas para la comunicación entre clientes y servidores sin protección • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= • CWE-523: Unprotected Transport of Credentials •

CVE-2022-31804 – CODESYS Gateway server prone to denial of service attack due to excessive memory allocation
https://notcve.org/view.php?id=CVE-2022-31804
24 Jun 2022 — The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition. El CODESYS Gateway Server versiónV2 no verifica que el tamaño de una petición esté dentro de los límites previstos. Un atacante no autenticado puede asignar una cantidad arbitraria de memoria, lo que puede conllevar a un bloqueo del Gateway debido a una condición... • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download= • CWE-789: Memory Allocation with Excessive Size Value •

CVE-2022-31803 – CODESYS Gateway Server V2 prone to Denial of Service Attack
https://notcve.org/view.php?id=CVE-2022-31803
24 Jun 2022 — In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact. En CODESYS Gateway Server versión V2, una comprobación insuficiente de la actividad de las conexiones de clientes TCP permite a un atacante no autenticado consumir to... • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download= • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-31802 – Partial string comparison in CODESYS gateway server
https://notcve.org/view.php?id=CVE-2022-31802
24 Jun 2022 — In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password. En CODESYS Gateway Server versión V2 para versiones anteriores a V2.3.9.38, sólo es comparada una parte de la contraseña especificada con la contraseña real de CODESYS Gateway. Un atacante puede llevar a... • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download= • CWE-187: Partial String Comparison •

CVE-2022-1965 – CODESYS runtime system prone to file deletion due to improper error handling
https://notcve.org/view.php?id=CVE-2022-1965
24 Jun 2022 — Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required. diversos productos de CODESYS implementan un manejo de errores inapropiado. Un atacante remoto poco privilegiado puede diseñar una petición, que no es procesada apropiadamente por el manejo de errores. • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2022-22519 – Special HTTP(s) Requests can cause a buffer-read causing a crash of the webserver and the runtime system.
https://notcve.org/view.php?id=CVE-2022-22519
07 Apr 2022 — A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system. Un atacante remoto y no autenticado puede enviar una solicitud HTTP o HTTPS con un diseño específico que provoque una sobrelectura del búfer y provoque un bloqueo del servidor web del sistema de ejecución de CODESYS Control • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17094&token=2fb188e2213c74194e81ba61ff99f1c68602ba4d&download= • CWE-125: Out-of-bounds Read CWE-126: Buffer Over-read •

CVE-2022-22518 – A bug in the CODESYS V3 CmpUserMgr component fails to correctly apply a security policy.
https://notcve.org/view.php?id=CVE-2022-22518
07 Apr 2022 — A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy. Un error en el componente CmpUserMgr puede conllevar a una aplicación parcial de las políticas de seguridad. Esto puede resultar en un acceso habilitado y anónimo a componentes que forman parte de la política de seguridad aplicada • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17092&token=a556b1695843bb42084dc63d5bdf553ca02ea393&download= • CWE-276: Incorrect Default Permissions •