// For flags

CVE-2019-9012

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

Se detectó un problema en los productos 3S-Smart CODESYS V3. Una petición de comunicación diseñada puede causar asignaciones de memoria no controladas en los productos CODESYS afectados y puede resultar en una condición de denegación de servicio. Todas las variantes de los siguientes productos CODESYS V3 en todas las versiones anteriores a v3.5.14.20 que contienen el componente CmpGateway están afectadas, indiferentemente del tipo de CPU o sistema operativo: CODESYS Control para BeagleBone, CODESYS Control para emPC-A/iMX6, CODESYS Control para IOT2000, CODESYS Control para Linux, CODESYS Control para PFC100, CODESYS Control para PFC200, CODESYS Control para Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-02-22 CVE Reserved
  • 2019-08-15 CVE Published
  • 2023-07-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Codesys
Search vendor "Codesys"
Control For Beaglebone Sl
Search vendor "Codesys" for product "Control For Beaglebone Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Beaglebone Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Empc-a\/imx6 Sl
Search vendor "Codesys" for product "Control For Empc-a\/imx6 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Empc-a\/imx6 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Iot2000 Sl
Search vendor "Codesys" for product "Control For Iot2000 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Iot2000 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Linux Sl
Search vendor "Codesys" for product "Control For Linux Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Linux Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc100 Sl
Search vendor "Codesys" for product "Control For Pfc100 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Pfc100 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc200 Sl
Search vendor "Codesys" for product "Control For Pfc200 Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Pfc200 Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control For Raspberry Pi Sl
Search vendor "Codesys" for product "Control For Raspberry Pi Sl"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control For Raspberry Pi Sl" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Control Runtime Toolkit
Search vendor "Codesys" for product "Control Runtime Toolkit"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Control Runtime Toolkit" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Development System
Search vendor "Codesys" for product "Development System"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Development System" and version " >= 3.0 < 3.5.14.20"
-
Affected
Codesys
Search vendor "Codesys"
Gateway
Search vendor "Codesys" for product "Gateway"
>= 3.0 < 3.5.14.20
Search vendor "Codesys" for product "Gateway" and version " >= 3.0 < 3.5.14.20"
-
Affected