An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

Project Subscriptions

Vendors Products
Codesys Subscribe
Control For Beaglebone Sl Subscribe
Control For Beckhoff Cx9020 Subscribe
Control For Empc-a\/imx6 Sl Subscribe
Control For Iot2000 Sl Subscribe
Control For Linux Sl Subscribe
Control For Pfc100 Sl Subscribe
Control For Pfc200 Sl Subscribe
Control For Plcnext Sl Subscribe
Control For Raspberry Pi Sl Subscribe
Control For Wago Touch Panels 600 Sl Subscribe
Control Rte Sl Subscribe
Control Rte Sl \(for Beckhoff Cx\) Subscribe
Control Runtime System Toolkit Subscribe
Control Win Sl Subscribe
Development System Subscribe
Edge Gateway Subscribe
Embedded Target Visu Toolkit Subscribe
Gateway Subscribe
Remote Target Visu Toolkit Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-27663 An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T22:16:04.923Z

Reserved: 2022-01-03T00:00:00

Link: CVE-2022-22517

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-07T19:15:08.300

Modified: 2024-11-21T06:46:56.430

Link: CVE-2022-22517

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses