Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21249 Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
Fixes

Solution

CODESYS GmbH has released CODESYS Git V1.1.0.0 to solve this vulnerability issue. CODESYS Git V1.1.0.0 can be downloaded and installed directly with the CODESYS Installer. CODESYS Git requires a CODESYS Development System version of V3.5.17.0 or newer.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T02:32:29.181Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-34599

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-01T09:15:06.627

Modified: 2024-11-21T06:10:47.380

Link: CVE-2021-34599

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.