Lucene search

K
nvd[email protected]NVD:CVE-2022-47387
HistoryMay 15, 2023 - 10:15 a.m.

CVE-2022-47387

2023-05-1510:15:10
CWE-787
web.nvd.nist.gov
5
authenticated
remote attacker
stack based
out-of-bounds write
vulnerability
cmptracemgr component
codesys products
denial-of-service
memory overwriting
remote code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.002

Percentile

55.6%

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

Affected configurations

Nvd
Node
codesyscontrol_for_beaglebone_slRange<3.5.19.0
OR
codesyscontrol_for_empc-a\/imx6_slRange<3.5.19.0
OR
codesyscontrol_for_iot2000_slRange<3.5.19.0
OR
codesyscontrol_for_linux_slRange<3.5.19.0
OR
codesyscontrol_for_pfc100_slRange<3.5.19.0
OR
codesyscontrol_for_pfc200_slRange<3.5.19.0
OR
codesyscontrol_for_plcnext_slRange<3.5.19.0
OR
codesyscontrol_for_raspberry_pi_slRange<3.5.19.0
OR
codesyscontrol_for_wago_touch_panels_600_slRange<3.5.19.0
OR
codesyscontrol_rte_\(for_beckhoff_cx\)_slRange<4.8.0.0
OR
codesyscontrol_rte_\(sl\)Range<4.8.0.0
OR
codesyscontrol_runtime_system_toolkitRange<4.8.0.0
OR
codesyscontrol_win_\(sl\)Range<4.8.0.0
OR
codesysdevelopment_system_v3Range<4.8.0.0
OR
codesyshmi_\(sl\)Range<4.8.0.0
OR
codesyssafety_sil2_pspRange<4.8.0.0
OR
codesyssafety_sil2_runtime_toolkitRange<4.8.0.0
VendorProductVersionCPE
codesyscontrol_for_beaglebone_sl*cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_empc-a\/imx6_sl*cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_iot2000_sl*cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_linux_sl*cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_pfc100_sl*cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_pfc200_sl*cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_plcnext_sl*cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_raspberry_pi_sl*cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_wago_touch_panels_600_sl*cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
codesyscontrol_rte_\(for_beckhoff_cx\)_sl*cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.002

Percentile

55.6%