CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Codesys
Subscribe
|
Control For Beaglebone Sl
Subscribe
Control For Empc-a\/imx6 Sl
Subscribe
Control For Iot2000 Sl
Subscribe
Control For Linux Arm Sl
Subscribe
Control For Linux Sl
Subscribe
Control For Pfc100 Sl
Subscribe
Control For Pfc200 Sl
Subscribe
Control For Plcnext Sl
Subscribe
Control For Raspberry Pi Sl
Subscribe
Control For Wago Touch Panels 600 Sl
Subscribe
Control Rte
Subscribe
Control Runtime System Toolkit
Subscribe
Control Win
Subscribe
Edge Gateway
Subscribe
Embedded Target Visu Toolkit
Subscribe
Gateway
Subscribe
Hmi
Subscribe
Opc Server
Subscribe
Plchandler
Subscribe
Remote Target Visu Toolkit
Subscribe
Safety Sil
Subscribe
Simulation Runtime
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-15881 | CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T22:02:51.582Z
Reserved: 2021-03-25T00:00:00
Link: CVE-2021-29242
No data.
Status : Modified
Published: 2021-05-03T14:15:07.667
Modified: 2024-11-21T06:00:52.023
Link: CVE-2021-29242
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD