CVE Vulnerabilities

CVE-2022-4224

Insecure Default Initialization of Resource

Published: Mar 23, 2023 | Modified: Feb 01, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

In multiple products of CODESYS v3 in multiple versions a remote low privileged userĀ could utilize this vulnerability to read and modify system files and OS resources or DoS the device.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

Affected Software

Name Vendor Start Version End Version
Control_for_beaglebone_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_empc-a/imx6_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_iot2000_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_linux_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_pfc100_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_pfc200_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_plcnext_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_raspberry_pi_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_for_wago_touch_panels_600_sl Codesys 3.0 (including) 4.8.0.0 (excluding)
Control_rte_sl Codesys 3.0 (including) 3.5.19.0 (excluding)
Control_rte_sl_(for_beckhoff_cx) Codesys 3.0 (including) 3.5.19.0 (excluding)
Control_win_sl Codesys 3.0 (including) 3.5.19.0 (excluding)
Development_system Codesys 3.0 (including) 3.5.19.0 (excluding)
Hmi_sl Codesys 3.0 (including) 3.5.19.0 (excluding)
Runtime_toolkit Codesys 3.0 (including) 3.5.19.0 (excluding)
Safety_sil2 Codesys 3.0 (including) 3.5.19.0 (excluding)

Extended Description

Developers often choose default values that leave the product as open and easy to use as possible out-of-the-box, under the assumption that the administrator can (or should) change the default value. However, this ease-of-use comes at a cost when the default is insecure and the administrator does not change it.

References