5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
70.0%
Nicholas Miles of Tenable Network Security has identified a NULL pointer dereference vulnerability in 3S-Smart Software Solutions GmbH’s CODESYS Runtime Toolkit. 3S has produced a new version to mitigate this vulnerability.
This vulnerability could be exploited remotely.
The following CODESYS software versions are affected:
Successful exploitation of this vulnerability may allow a remote attacker to crash the Runtime Toolkit, resulting in a denial of service condition.
Impact to individual organizations depends on many factors that are unique to each organization. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.
3S-Smart Software Solutions GmbH is headquartered in Kempten, Germany, and has distributors in more than 10 countries worldwide.
The affected product, CODESYS Runtime Toolkit, is embedded third-party software. According to 3S, CODESYS is deployed across several sectors including Critical Manufacturing, Energy, Transportation Systems, and others. 3S-Smart Software Solutions GmbH estimates that these products are used worldwide.
A crafted request may allow a NULL pointer dereference that could crash the Runtime Toolkit causing a denial-of-service condition.
CVE-2015-6482NVD, http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6482, NIST uses this advisory to create the CVE web site report. This web site will be active sometime after publication of this advisory. has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). CVSS Calculator, https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, web site last accessed October 15, 2015.
This vulnerability could be exploited remotely.
No known public exploits specifically target this vulnerability.
An attacker with a low skill would be able to exploit this vulnerability.
3S-Smart Software Solutions GmbH has released a new version of CODESYS, Version 2.3.9.48, which contains a new version of the Runtime Toolkit, Version 2.4.7.48. CODESYS, Version 2.3.9.48 is available at the following location with a valid user account:
<https://www.codesys.com/download/download-center.html>
For additional information about the new version of CODESYS or questions about the vulnerability, the CODESYS Support Team’s contact information is as follows:
<https://www.codesys.com/support-training/codesys-support/inquiry-per-phone-e-mail.html>
ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page at: http://ics-cert.us-cert.gov/content/recommended-practices. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site (http://ics-cert.us-cert.gov/).
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=3S%20CODESYS%20Runtime%20Toolkit%20Null%20Pointer%20Dereference%20Vulnerability+https://www.cisa.gov/news-events/ics-advisories/icsa-15-288-01
www.codesys.com/download/download-center.html
www.codesys.com/support-training/codesys-support/inquiry-per-phone-e-mail.html
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-15-288-01&title=3S%20CODESYS%20Runtime%20Toolkit%20Null%20Pointer%20Dereference%20Vulnerability
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-15-288-01
www.oig.dhs.gov/
www.surveymonkey.com/r/CISA-cyber-survey?product=https://www.cisa.gov/news-events/ics-advisories/icsa-15-288-01
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=3S%20CODESYS%20Runtime%20Toolkit%20Null%20Pointer%20Dereference%20Vulnerability&body=www.cisa.gov/news-events/ics-advisories/icsa-15-288-01