An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| codesys | control_for_beaglebone_sl | 4.8.0.0 | - |
| codesys | control_for_empc-a\/imx6_sl | 4.8.0.0 | - |
| codesys | control_for_iot2000_sl |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
17
Affected Products
2
References
codesys / control_for_beaglebone_sl
| 4.8.0.0 |
| - |
| codesys | control_for_linux_sl | 4.8.0.0 | - |
| codesys | control_for_pfc100_sl | 4.8.0.0 | - |
| codesys | control_for_pfc200_sl | 4.8.0.0 | - |
| codesys | control_for_plcnext_sl | 4.8.0.0 | - |
| codesys | control_for_raspberry_pi_sl | 4.8.0.0 | - |
| codesys | control_for_wago_touch_panels_600_sl | 4.8.0.0 | - |
| codesys | control_rte_\(for_beckhoff_cx\)_sl | 3.5.19.0 | - |
| codesys | control_rte_\(sl\) | 3.5.19.0 | - |
| codesys | control_runtime_system_toolkit | 3.5.19.0 | - |
| codesys | control_win_\(sl\) | 3.5.19.0 | - |
| codesys | development_system_v3 | 3.5.19.0 | - |
| codesys | hmi_\(sl\) | 3.5.19.0 | - |
| codesys | safety_sil2_psp | 3.5.19.0 | - |
| codesys | safety_sil2_runtime_toolkit | 3.5.19.0 | - |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact