VAR-202003-0671
Vulnerability from variot - Updated: 2023-12-18 13:18An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System). 3S-Smart Software Solutions, CODESYS Control for BeagleBone, etc. are all products of German 3S-Smart Software Solutions. CODESYS Control for BeagleBone is a set of industrial control program programming software. CODESYS Control is a set of industrial control program programming software. CODESYS Development System is a set of programming tools for industrial controllers and automation technology. Safety and other products are all products. Safety is a Python-based software package for checking program safety. 3S-Smart Software Solutions CODESYS GatewayService is a gateway service used in CODESYS products. The following products and versions (including CmpRouter or CmpRouterEmbedded components) are affected: CODESYS Control for BeagleBone before V3.5.15.40, CODESYS Control for emPC-A/iMX6 before V3.5.15.40, and CODESYS Control for IOT2000 V3.5.15
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202003-0671",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "codesys",
"scope": "eq",
"trust": 1.0,
"vendor": "codesys",
"version": "3.5.13.2"
},
{
"model": "codesys",
"scope": "eq",
"trust": 0.8,
"vendor": "3s smart",
"version": "3.5.13.20"
},
{
"model": null,
"scope": "eq",
"trust": 0.6,
"vendor": "codesys",
"version": "3.5.13.2"
},
{
"model": "software solutions codesys gatewayservice",
"scope": "eq",
"trust": 0.6,
"vendor": "3s smart",
"version": "3.5.13.20"
}
],
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:codesys:codesys:3.5.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5105"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Carl Hurd of Cisco Talos and an OEM customer",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
],
"trust": 0.6
},
"cve": "CVE-2019-5105",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2019-015230",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2020-23223",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "528a9f71-c716-457a-9e08-7de703fe34e2",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.2,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "talos-cna@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2019-015230",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-5105",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "talos-cna@cisco.com",
"id": "CVE-2019-5105",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2019-015230",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-23223",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-202003-1616",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2",
"trust": 0.2,
"value": "HIGH"
},
{
"author": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System). 3S-Smart Software Solutions, CODESYS Control for BeagleBone, etc. are all products of German 3S-Smart Software Solutions. CODESYS Control for BeagleBone is a set of industrial control program programming software. CODESYS Control is a set of industrial control program programming software. CODESYS Development System is a set of programming tools for industrial controllers and automation technology. Safety and other products are all products. Safety is a Python-based software package for checking program safety. 3S-Smart Software Solutions CODESYS GatewayService is a gateway service used in CODESYS products. The following products and versions (including CmpRouter or CmpRouterEmbedded components) are affected: CODESYS Control for BeagleBone before V3.5.15.40, CODESYS Control for emPC-A/iMX6 before V3.5.15.40, and CODESYS Control for IOT2000 V3.5.15",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
},
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
}
],
"trust": 3.24
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-5105",
"trust": 3.6
},
{
"db": "TALOS",
"id": "TALOS-2019-0897",
"trust": 3.0
},
{
"db": "CNVD",
"id": "CNVD-2020-23223",
"trust": 1.2
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230",
"trust": 0.8
},
{
"db": "IVD",
"id": "C2CA4C36-A698-4421-B8D5-AAF8DED1870A",
"trust": 0.2
},
{
"db": "IVD",
"id": "528A9F71-C716-457A-9E08-7DE703FE34E2",
"trust": 0.2
},
{
"db": "IVD",
"id": "436A9437-F932-4A7A-9F3E-24717565F5A3",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"id": "VAR-202003-0671",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
}
],
"trust": 1.98977272
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
}
]
},
"last_update_date": "2023-12-18T13:18:21.871000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.codesys.com/"
},
{
"title": "Patch for 3S-Smart Software Solutions CODESYS GatewayService buffer overflow vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/214347"
},
{
"title": "3S-Smart Software Solutions CODESYS GatewayService Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=113021"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.0
},
{
"problemtype": "CWE-119",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.6,
"url": "https://talosintelligence.com/vulnerability_reports/talos-2019-0897"
},
{
"trust": 1.6,
"url": "https://customers.codesys.com/index.php?eid=dumpfile\u0026t=f\u0026f=13077\u0026token=3bfc6d1d08415a6260b96093520071f5786e7fd4\u0026download="
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5105"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5105"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-03-25T00:00:00",
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"date": "2020-03-25T00:00:00",
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"date": "2020-03-25T00:00:00",
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"date": "2020-04-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"date": "2020-04-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"date": "2020-03-26T15:15:24.537000",
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"date": "2020-03-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-04-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-23223"
},
{
"date": "2020-04-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-015230"
},
{
"date": "2022-04-29T17:15:14.813000",
"db": "NVD",
"id": "CVE-2019-5105"
},
{
"date": "2021-08-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "3S-Smart Software Solutions CODESYS GatewayService Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNVD",
"id": "CNVD-2020-23223"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer error",
"sources": [
{
"db": "IVD",
"id": "c2ca4c36-a698-4421-b8d5-aaf8ded1870a"
},
{
"db": "IVD",
"id": "528a9f71-c716-457a-9e08-7de703fe34e2"
},
{
"db": "IVD",
"id": "436a9437-f932-4a7a-9f3e-24717565f5a3"
},
{
"db": "CNNVD",
"id": "CNNVD-202003-1616"
}
],
"trust": 1.2
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.