Lucene search

K
nvd[email protected]NVD:CVE-2022-47389
HistoryMay 15, 2023 - 10:15 a.m.

CVE-2022-47389

2023-05-1510:15:10
CWE-787
web.nvd.nist.gov
4
cve-2022-47389
authenticated
remote attacker
cmptracemgr component
codesys products
denial-of-service
memory overwriting
remote code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.002

Percentile

55.6%

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

Affected configurations

Nvd
Node
codesyscontrol_for_beaglebone_slRange<3.5.19.0
OR
codesyscontrol_for_empc-a\/imx6_slRange<3.5.19.0
OR
codesyscontrol_for_iot2000_slRange<3.5.19.0
OR
codesyscontrol_for_linux_slRange<3.5.19.0
OR
codesyscontrol_for_pfc100_slRange<3.5.19.0
OR
codesyscontrol_for_pfc200_slRange<3.5.19.0
OR
codesyscontrol_for_plcnext_slRange<3.5.19.0
OR
codesyscontrol_for_raspberry_pi_slRange<3.5.19.0
OR
codesyscontrol_for_wago_touch_panels_600_slRange<3.5.19.0
OR
codesyscontrol_rte_\(for_beckhoff_cx\)_slRange<4.8.0.0
OR
codesyscontrol_rte_\(sl\)Range<4.8.0.0
OR
codesyscontrol_runtime_system_toolkitRange<4.8.0.0
OR
codesyscontrol_win_\(sl\)Range<4.8.0.0
OR
codesysdevelopment_system_v3Range<4.8.0.0
OR
codesyshmi_\(sl\)Range<4.8.0.0
OR
codesyssafety_sil2_pspRange<4.8.0.0
OR
codesyssafety_sil2_runtime_toolkitRange<4.8.0.0
VendorProductVersionCPE
codesyscontrol_for_beaglebone_sl*cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_empc-a\/imx6_sl*cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_iot2000_sl*cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_linux_sl*cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_pfc100_sl*cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_pfc200_sl*cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_plcnext_sl*cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_raspberry_pi_sl*cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
codesyscontrol_for_wago_touch_panels_600_sl*cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
codesyscontrol_rte_\(for_beckhoff_cx\)_sl*cpe:2.3:a:codesys:control_rte_\(for_beckhoff_cx\)_sl:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 171

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0.002

Percentile

55.6%