Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21249 | Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack. |
Fixes
Solution
CODESYS GmbH has released CODESYS Git V1.1.0.0 to solve this vulnerability issue. CODESYS Git V1.1.0.0 can be downloaded and installed directly with the CODESYS Installer. CODESYS Git requires a CODESYS Development System version of V3.5.17.0 or newer.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T02:32:29.181Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34599
No data.
Status : Modified
Published: 2021-12-01T09:15:06.627
Modified: 2024-11-21T06:10:47.380
Link: CVE-2021-34599
No data.
OpenCVE Enrichment
No data.
EUVD