4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
4.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
30.2%
Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remote attacker to block consecutive logins of a specific type.
[
{
"defaultStatus": "unaffected",
"modules": [
"CmpNameServiceServer"
],
"product": "CODESYS Control RTE (SL)",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V3.5.18.40",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"CmpNameServiceServer"
],
"product": "CODESYS Control RTE (for Beckhoff CX) SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V3.5.18.40",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"CmpNameServiceServer"
],
"product": "CODESYS Control Win (SL)",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V3.5.18.40",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"CmpNameServiceServer"
],
"product": "CODESYS HMI (SL)",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V3.5.18.40",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"CmpNameServiceServer"
],
"product": "CODESYS Control Runtime System Toolkit",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V3.5.18.40",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for BeagleBone SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for emPC-A/iMX6 SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for IOT2000 SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Linux SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC100 SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PFC200 SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for PLCnext SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for Raspberry Pi SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "CODESYS Control for WAGO Touch Panels 600 SL",
"vendor": "CODESYS V3",
"versions": [
{
"lessThan": "V4.7.0.0",
"status": "affected",
"version": "V0.0.0.0",
"versionType": "custom"
}
]
}
]
4.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
4.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
30.2%