CVE-2022-32138
CODESYS runtime system prone to denial of service due to Unexpected Sign Extension
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite.
En diversos productos CODESYS, un atacante remoto puede diseñar una petición que puede causar una extensión de signo inesperada, resultando en una condición de negación de servicio o sobreescritura de memoria
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2022-05-31 CVE Reserved
- 2022-06-24 CVE Published
- 2024-09-06 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-194: Unexpected Sign Extension
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Codesys Search vendor "Codesys" | Plcwinnt Search vendor "Codesys" for product "Plcwinnt" | >= 2.0 < 2.4.7.57 Search vendor "Codesys" for product "Plcwinnt" and version " >= 2.0 < 2.4.7.57" | - |
Affected
| ||||||
Codesys Search vendor "Codesys" | Runtime Toolkit Search vendor "Codesys" for product "Runtime Toolkit" | >= 2.0 < 2.4.7.57 Search vendor "Codesys" for product "Runtime Toolkit" and version " >= 2.0 < 2.4.7.57" | x86 |
Affected
|