CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

Project Subscriptions

Vendors Products
Codesys Subscribe
Control For Beaglebone Sl Subscribe
Control For Empc-a\/imx6 Sl Subscribe
Control For Iot2000 Sl Subscribe
Control For Linux Arm Sl Subscribe
Control For Linux Sl Subscribe
Control For Pfc100 Sl Subscribe
Control For Pfc200 Sl Subscribe
Control For Plcnext Sl Subscribe
Control For Raspberry Pi Sl Subscribe
Control For Wago Touch Panels 600 Sl Subscribe
Control Rte Subscribe
Control Runtime System Toolkit Subscribe
Control Win Subscribe
Edge Gateway Subscribe
Embedded Target Visu Toolkit Subscribe
Gateway Subscribe
Opc Server Subscribe
Plchandler Subscribe
Remote Target Visu Toolkit Subscribe
Safety Sil Subscribe
Simulation Runtime Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-15881 CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:02:51.582Z

Reserved: 2021-03-25T00:00:00

Link: CVE-2021-29242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-03T14:15:07.667

Modified: 2024-11-21T06:00:52.023

Link: CVE-2021-29242

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses