Description
An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-50146 | An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution. |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 05 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Codesys
Subscribe
Control For Beaglebone Sl
Subscribe
Control For Empc-a\/imx6 Sl
Subscribe
Control For Iot2000 Sl
Subscribe
Control For Linux Sl
Subscribe
Control For Pfc100 Sl
Subscribe
Control For Pfc200 Sl
Subscribe
Control For Plcnext Sl
Subscribe
Control For Raspberry Pi Sl
Subscribe
Control For Wago Touch Panels 600 Sl
Subscribe
Control Rte \(for Beckhoff Cx\) Sl
Subscribe
Control Rte \(sl\)
Subscribe
Control Runtime System Toolkit
Subscribe
Control Win \(sl\)
Subscribe
Development System V3
Subscribe
Hmi \(sl\)
Subscribe
Safety Sil2 Psp
Subscribe
Safety Sil2 Runtime Toolkit
Subscribe
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-03-05T19:01:07.355Z
Reserved: 2022-12-14T06:03:27.263Z
Link: CVE-2022-47379
Updated: 2024-08-03T14:55:07.032Z
Status : Analyzed
Published: 2023-05-15T10:15:09.530
Modified: 2025-07-17T12:38:27.903
Link: CVE-2022-47379
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD