// For flags

CVE-2019-13542

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, todas las versiones desde 3.5.11.0 hasta 3.5.15.0, permite a un atacante enviar peticiones diseñadas desde un cliente OPC UA confiable que causa una desreferencia del puntero NULL, lo que puede desencadenar una condición de denegación de servicio.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-07-11 CVE Reserved
  • 2019-09-17 CVE Published
  • 2024-01-29 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-476: NULL Pointer Dereference
CAPEC
References (1)
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Codesys
Search vendor "Codesys"
Control For Beaglebone
Search vendor "Codesys" for product "Control For Beaglebone"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Beaglebone" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Empc-a\/imx6
Search vendor "Codesys" for product "Control For Empc-a\/imx6"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Empc-a\/imx6" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Iot2000
Search vendor "Codesys" for product "Control For Iot2000"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Iot2000" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc100
Search vendor "Codesys" for product "Control For Pfc100"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Pfc100" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc200
Search vendor "Codesys" for product "Control For Pfc200"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Pfc200" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Raspberry Pi
Search vendor "Codesys" for product "Control For Raspberry Pi"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control For Raspberry Pi" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control Rte
Search vendor "Codesys" for product "Control Rte"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control Rte" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Control Win
Search vendor "Codesys" for product "Control Win"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Control Win" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Linux
Search vendor "Codesys" for product "Linux"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Linux" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected
Codesys
Search vendor "Codesys"
Runtime System Toolkit
Search vendor "Codesys" for product "Runtime System Toolkit"
>= 3.5.11.0 < 3.5.15.0
Search vendor "Codesys" for product "Runtime System Toolkit" and version " >= 3.5.11.0 < 3.5.15.0"
-
Affected