A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Control_for_beaglebone_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_beckhoff_cx9020 | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_empc-a/imx6_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_iot2000_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_linux_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_pfc100_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_pfc200_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_plcnext_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_raspberry_pi_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_for_wago_touch_panels_600_sl | Codesys | * | 4.5.0.0 (excluding) |
| Control_rte_sl | Codesys | * | 3.5.18.0 (excluding) |
| Control_rte_sl_(for_beckhoff_cx) | Codesys | * | 3.5.18.0 (excluding) |
| Control_runtime_system_toolkit | Codesys | * | 3.5.18.0 (excluding) |
| Control_win_sl | Codesys | * | 3.5.18.0 (excluding) |
| Development_system | Codesys | * | 3.5.18.0 (excluding) |
| Embedded_target_visu_toolkit | Codesys | * | 3.5.18.0 (excluding) |
| Hmi_sl | Codesys | * | 3.5.18.0 (excluding) |
| Remote_target_visu_toolkit | Codesys | * | 3.5.18.0 (excluding) |