An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Codesys
Subscribe
|
Control For Beaglebone Sl
Subscribe
Control For Beckhoff Cx9020
Subscribe
Control For Empc-a\/imx6 Sl
Subscribe
Control For Iot2000 Sl
Subscribe
Control For Linux Sl
Subscribe
Control For Pfc100 Sl
Subscribe
Control For Pfc200 Sl
Subscribe
Control For Plcnext Sl
Subscribe
Control For Raspberry Pi Sl
Subscribe
Control For Wago Touch Panels 600 Sl
Subscribe
Control Rte Sl
Subscribe
Control Rte Sl \(for Beckhoff Cx\)
Subscribe
Control Runtime System Toolkit
Subscribe
Control Win Sl
Subscribe
Development System
Subscribe
Edge Gateway
Subscribe
Embedded Target Visu Toolkit
Subscribe
Gateway
Subscribe
Hmi Sl
Subscribe
Remote Target Visu Toolkit
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-27663 | An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T22:16:04.923Z
Reserved: 2022-01-03T00:00:00
Link: CVE-2022-22517
No data.
Status : Modified
Published: 2022-04-07T19:15:08.300
Modified: 2024-11-21T06:46:56.430
Link: CVE-2022-22517
No data.
OpenCVE Enrichment
No data.
EUVD