CVE Vulnerabilities

CVE-2022-22517

Small Space of Random Values

Published: Apr 07, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

Weakness

The number of possible random values is smaller than needed by the product, making it more susceptible to brute force attacks.

Affected Software

NameVendorStart VersionEnd Version
Control_for_beaglebone_slCodesys*4.5.0.0 (excluding)
Control_for_beckhoff_cx9020Codesys*4.5.0.0 (excluding)
Control_for_empc-a/imx6_slCodesys*4.5.0.0 (excluding)
Control_for_iot2000_slCodesys*4.5.0.0 (excluding)
Control_for_linux_slCodesys*4.5.0.0 (excluding)
Control_for_pfc100_slCodesys*4.5.0.0 (excluding)
Control_for_pfc200_slCodesys*4.5.0.0 (excluding)
Control_for_plcnext_slCodesys*4.5.0.0 (excluding)
Control_for_raspberry_pi_slCodesys*4.5.0.0 (excluding)
Control_for_wago_touch_panels_600_slCodesys*4.5.0.0 (excluding)
Control_rte_slCodesys*3.5.18.0 (excluding)
Control_rte_sl_(for_beckhoff_cx)Codesys*3.5.18.0 (excluding)
Control_runtime_system_toolkitCodesys*3.5.18.0 (excluding)
Control_win_slCodesys*3.5.18.0 (excluding)
Development_systemCodesys3.0 (including)3.5.18.0 (excluding)
Edge_gatewayCodesys*3.5.18.0 (excluding)
Edge_gatewayCodesys*4.5.0.0 (excluding)
Embedded_target_visu_toolkitCodesys*3.5.18.0 (excluding)
GatewayCodesys*3.5.18.0 (excluding)
Hmi_slCodesys*3.5.18.0 (excluding)
Remote_target_visu_toolkitCodesys*3.5.18.0 (excluding)

Potential Mitigations

References