CVE-2022-31803
CODESYS Gateway Server V2 prone to Denial of Service Attack
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.
En CODESYS Gateway Server versión V2, una comprobación insuficiente de la actividad de las conexiones de clientes TCP permite a un atacante no autenticado consumir todas las conexiones TCP disponibles e impedir que los usuarios o clientes legítimos establezcan una nueva conexión con CODESYS Gateway Server V2. Las conexiones existentes no están afectadas y, por tanto, permanecen intactas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-05-30 CVE Reserved
- 2022-06-24 CVE Published
- 2024-01-15 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Codesys Search vendor "Codesys" | Gateway Search vendor "Codesys" for product "Gateway" | >= 2.0 < 2.3.9.38 Search vendor "Codesys" for product "Gateway" and version " >= 2.0 < 2.3.9.38" | - |
Affected
|