Description
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
No analysis available yet.
Remediation
Vendor Solution
CODESYS GmbH has released CODESYS Git V1.1.0.0 to solve this vulnerability issue. CODESYS Git V1.1.0.0 can be downloaded and installed directly with the CODESYS Installer. CODESYS Git requires a CODESYS Development System version of V3.5.17.0 or newer.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21249 | Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack. |
References
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T02:32:29.181Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34599
No data.
Status : Modified
Published: 2021-12-01T09:15:06.627
Modified: 2024-11-21T06:10:47.380
Link: CVE-2021-34599
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD