// For flags

CVE-2019-9010

 

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

Se detectó un problema en los productos 3S-Smart CODESYS V3. CODESYS Gateway no comprueba correctamente la propiedad de un canal de comunicación. Todas las variantes de los siguientes productos CODESYS V3 en todas las versiones anteriores a v3.5.14.20 que contienen el componente CmpGateway están afectadas, indiferentemente del tipo de CPU o sistema operativo: CODESYS Control para BeagleBone, CODESYS Control para emPC-A/iMX6, CODESYS Control para IOT2000, CODESYS Control para Linux, CODESYS Control para PFC100, CODESYS Control para PFC200, CODESYS Control para Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-02-22 CVE Reserved
  • 2019-08-15 CVE Published
  • 2023-07-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Codesys
Search vendor "Codesys"
Control For Beaglebone Sl
Search vendor "Codesys" for product "Control For Beaglebone Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Beaglebone Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Empc-a\/imx6 Sl
Search vendor "Codesys" for product "Control For Empc-a\/imx6 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Empc-a\/imx6 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Iot2000 Sl
Search vendor "Codesys" for product "Control For Iot2000 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Iot2000 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Linux Sl
Search vendor "Codesys" for product "Control For Linux Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Linux Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc100 Sl
Search vendor "Codesys" for product "Control For Pfc100 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Pfc100 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc200 Sl
Search vendor "Codesys" for product "Control For Pfc200 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Pfc200 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Raspberry Pi Sl
Search vendor "Codesys" for product "Control For Raspberry Pi Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Raspberry Pi Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control Runtime Toolkit
Search vendor "Codesys" for product "Control Runtime Toolkit"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control Runtime Toolkit" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Development System
Search vendor "Codesys" for product "Development System"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Development System" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Gateway
Search vendor "Codesys" for product "Gateway"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Gateway" and version " >= 3.0 < 3.5.14.20"
-
Affected