Lucene search

K
cve[email protected]CVE-2022-31805
HistoryJun 24, 2022 - 8:15 a.m.

CVE-2022-31805

2022-06-2408:15:07
CWE-523
web.nvd.nist.gov
44
7
cve-2022-31805
codesys
development system
password communication
unprotected transmission

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.5%

In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.

Affected configurations

NVD
Node
codesysdevelopment_systemRange<2.3.9.69
OR
codesysedge_gatewayRange<3.5.18.30windows
OR
codesysgatewayRange<2.3.9.38
OR
codesyshmi_slRange<3.5.18.30
OR
codesysopc_serverRange<3.5.18.30
OR
codesysplchandlerRange<3.5.18.30
OR
codesysplcwinntRange<2.4.7.57
OR
codesysruntime_toolkitRange<2.4.7.57x86
OR
codesyssp_realtime_ntRange<2.3.7.30
OR
codesysweb_serverRange<1.1.9.23

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Development System",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.3.9.69",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      },
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Gateway Client",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.3.9.38",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Gateway Server",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.3.9.38",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Web server",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": " V1.1.9.23",
        "status": "affected",
        "version": "V1",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS SP Realtime NT",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.3.7.30",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS PLCWinNT",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.4.7.57",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Runtime Toolkit 32 bit full",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V2.4.7.57",
        "status": "affected",
        "version": "V2",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Edge Gateway for Windows",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS HMI (SL)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS OPC DA Server SL",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS PLCHandler",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "CODESYS Gateway",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "V3.5.18.30",
        "status": "affected",
        "version": "V3",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.5%

Related for CVE-2022-31805