CVE-2022-47393 (GCVE-0-2022-47393)
Vulnerability from cvelistv5 – Published: 2023-05-15 10:03 – Updated: 2025-03-05 18:59
VLAI?
Summary
An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.
Severity ?
6.5 (Medium)
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CODESYS | CODESYS Control RTE (SL) |
Affected:
V0.0.0.0 , < V3.5.19.0
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Vladimir Tokarev, Microsoft
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:55:08.190Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-47393",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-05T18:37:02.605164Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-05T18:59:25.695Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CODESYS Control RTE (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control RTE (for Beckhoff CX) SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control Win (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control Runtime System Toolkit",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Safety SIL2 Runtime Toolkit",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Safety SIL2 PSP",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS HMI (SL)",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Development System V3",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V3.5.19.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for BeagleBone SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for emPC-A/iMX6 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for IOT2000 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Linux SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC100 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC200 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PLCnext SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Raspberry Pi SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for WAGO Touch Panels 600 SL",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V4.8.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Vladimir Tokarev, Microsoft"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation."
}
],
"value": "An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-15T10:03:58.680Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download="
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS: Multiple products prone to improperly restricted memory operations",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-47393",
"datePublished": "2023-05-15T10:03:58.680Z",
"dateReserved": "2022-12-14T06:03:27.266Z",
"dateUpdated": "2025-03-05T18:59:25.695Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"523FC1D5-2A13-4B4D-9EE6-7895A955F631\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_empc-a\\\\/imx6_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"6E4DDA5F-C7CD-4ADE-AE44-B2F2C2F6B61C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"968E3873-9D42-4516-B884-56D49BB8BE8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"8FD4E051-A23A-4214-A599-5EDFD40B4843\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"27B2E352-6ACE-4F3D-B462-4DE1197DAF04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"3F20DC27-C98B-49CF-9C39-9FB483438FD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"80A1AAE3-1A29-4B1E-8C50-0EA87D158371\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"9C58C0EB-17CF-4ACA-B691-BBB558A77B4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.5.19.0\", \"matchCriteriaId\": \"00007AE1-3679-4D05-96E2-F0F45E73B2B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_rte_\\\\(for_beckhoff_cx\\\\)_sl:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"44E6A757-BB46-467E-B0DD-916672995584\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_rte_\\\\(sl\\\\):*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"C74B30D2-2653-4D2A-BEEC-0AB1843097AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"A9CF7388-0541-4CEA-B83B-127466DA6635\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:control_win_\\\\(sl\\\\):*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"0D2297BF-E19B-4FA6-841F-0D5915D345CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"BBAA2041-8C65-4CC5-AC77-45DE2DEA458F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:hmi_\\\\(sl\\\\):*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"A2F76A22-9A91-4683-8F85-322E2AA00E28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"B37C6669-08B9-4588-B871-3203E8ABFCE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.8.0.0\", \"matchCriteriaId\": \"B4E932B1-1475-40A0-AF58-D4F643A6A850\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.\"}]",
"id": "CVE-2022-47393",
"lastModified": "2024-11-21T07:31:53.560",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"info@cert.vde.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2023-05-15T11:15:08.820",
"references": "[{\"url\": \"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\", \"source\": \"info@cert.vde.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"info@cert.vde.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-47393\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2023-05-15T11:15:08.820\",\"lastModified\":\"2025-07-17T13:11:12.280\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.\"},{\"lang\":\"es\",\"value\":\"Un atacante remoto autenticado puede usar una vulnerabilidad de restricci\u00f3n inadecuada de operaciones dentro de los l\u00edmites de un b\u00fafer de memoria en m\u00faltiples versiones de m\u00faltiples productos CODESYS para forzar una situaci\u00f3n de denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"D2A50DA7-2372-470C-A4DD-29837A4D428A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_empc-a\\\\/imx6_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"0ADC5883-5087-45E0-95E2-3D414C6417DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"7178B980-82CC-4A30-B278-A4D1F319D678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"8AFD0474-DCBC-4F9E-BE1B-7BDCCB9D801F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"61D99F13-9297-4812-90AD-3EB43276D344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"E5F2E302-39C1-4674-A2BE-A6D1D761B4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"FF8FBED1-D729-4E07-A644-70D8FC87E965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"00EF8A8D-8A5F-4E7B-A14A-BFEE3297E3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.8.0.0\",\"matchCriteriaId\":\"2AA9F089-875B-4A90-A818-1BD06602D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_\\\\(for_beckhoff_cx\\\\)_sl:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"F1A18AA8-CDF4-4664-906F-76060AFED925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_rte_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"725E570C-6F46-4526-90B5-F4CAF70A7688\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"AD993BD6-B52E-4BA7-A7D7-A0EBE7FDEDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:control_win_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"FBA9CDA8-4FA0-4258-B477-D2C8DBDD8B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"FC41CB40-21CD-4621-9B23-9BF8E0AE93E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:hmi_\\\\(sl\\\\):*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"C664BC1C-889F-4A54-8E81-AB60B0D4D93B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"49220E0D-3DD6-492B-BD58-C4951D7D2B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.5.19.0\",\"matchCriteriaId\":\"DDF04E45-90A5-47FB-8101-9A56BD4F9C3F\"}]}]}],\"references\":[{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control RTE (SL)\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control RTE (for Beckhoff CX) SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control Win (SL)\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control Runtime System Toolkit\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Safety SIL2 Runtime Toolkit\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Safety SIL2 PSP\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS HMI (SL)\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Development System V3\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V3.5.19.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for BeagleBone SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for emPC-A/iMX6 SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for IOT2000 SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for Linux SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for PFC100 SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for PFC200 SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for PLCnext SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for Raspberry Pi SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}, {\"defaultStatus\": \"unaffected\", \"product\": \"CODESYS Control for WAGO Touch Panels 600 SL\", \"vendor\": \"CODESYS\", \"versions\": [{\"lessThan\": \"V4.8.0.0\", \"status\": \"affected\", \"version\": \"V0.0.0.0\", \"versionType\": \"semver\"}]}], \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Vladimir Tokarev, Microsoft\"}], \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.\"}], \"value\": \"An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.\"}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-119\", \"description\": \"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"shortName\": \"CERTVDE\", \"dateUpdated\": \"2023-05-15T10:03:58.680Z\"}, \"references\": [{\"url\": \"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\"}], \"source\": {\"discovery\": \"EXTERNAL\"}, \"title\": \"CODESYS: Multiple products prone to improperly restricted memory operations\", \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T14:55:08.190Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=17554\u0026token=5444f53b4c90fe37043671a100dffa75305d1825\u0026download=\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-47393\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-05T18:37:02.605164Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-05T18:37:04.649Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2022-47393\", \"assignerOrgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"CERTVDE\", \"dateReserved\": \"2022-12-14T06:03:27.266Z\", \"datePublished\": \"2023-05-15T10:03:58.680Z\", \"dateUpdated\": \"2025-03-05T18:59:25.695Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…