codesys CVE Vulnerabilities & Metrics

Focus on codesys vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About codesys Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with codesys. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total codesys CVEs: 113
Earliest CVE date: 19 May 2017, 03:29 UTC
Latest CVE date: 05 Dec 2023, 15:15 UTC

Latest CVE reference: CVE-2023-6357

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical codesys CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.65

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 43
4.0-6.9 58
7.0-8.9 10
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS codesys CVEs

These are the five CVEs with the highest CVSS scores for codesys, sorted by severity first and recency.

All CVEs for codesys

CVE-2023-6357 codesys vulnerability CVSS: 0 05 Dec 2023, 15:15 UTC

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.

CVE-2022-4046 codesys vulnerability CVSS: 0 03 Aug 2023, 13:15 UTC

In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.

CVE-2023-3669 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog.

CVE-2023-37559 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37558

CVE-2023-37558 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37559

CVE-2023-37557 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer, which can lead to a denial-of-service condition.

CVE-2023-37556 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37555.

CVE-2023-37555 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37556.

CVE-2023-37554 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37555 and CVE-2023-37556.

CVE-2023-37553 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.

CVE-2023-37552 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37553, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.

CVE-2023-37551 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.

CVE-2023-37550 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37549.

CVE-2023-37549 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37550

CVE-2023-37548 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37549 and CVE-2023-37550

CVE-2023-37547 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550

CVE-2023-37546 codesys vulnerability CVSS: 0 03 Aug 2023, 12:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550

CVE-2023-3663 codesys vulnerability CVSS: 0 03 Aug 2023, 11:15 UTC

In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.

CVE-2023-3662 codesys vulnerability CVSS: 0 03 Aug 2023, 11:15 UTC

In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .

CVE-2023-37545 codesys vulnerability CVSS: 0 03 Aug 2023, 11:15 UTC

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37546, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549, CVE-2023-37550

CVE-2023-3670 codesys vulnerability CVSS: 0 28 Jul 2023, 08:15 UTC

In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.

CVE-2022-47393 codesys vulnerability CVSS: 0 15 May 2023, 11:15 UTC

An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.

CVE-2022-47392 codesys vulnerability CVSS: 0 15 May 2023, 11:15 UTC

An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/CmpAppBP/CmpAppForce Components of multiple CODESYS products in multiple versions to read from an invalid address which can lead to a denial-of-service condition.

CVE-2022-47391 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.

CVE-2022-47390 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47389 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47388 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47387 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47386 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47385 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47384 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47383 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47382 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47381 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47380 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated remote attacker may use a stack based  out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47379 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

CVE-2022-47378 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.

CVE-2022-22508 codesys vulnerability CVSS: 0 15 May 2023, 10:15 UTC

Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remote attacker to block consecutive logins of a specific type.

CVE-2022-4224 codesys vulnerability CVSS: 0 23 Mar 2023, 12:15 UTC

In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.

CVE-2018-25048 codesys vulnerability CVSS: 0 23 Mar 2023, 11:15 UTC

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

CVE-2020-12069 codesys vulnerability CVSS: 0 26 Dec 2022, 19:15 UTC

In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.

CVE-2022-1989 codesys vulnerability CVSS: 0 23 Aug 2022, 10:15 UTC

All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information exposure allowing a remote, unauthenticated attacker to enumerate valid users.

CVE-2022-30792 codesys vulnerability CVSS: 5.0 11 Jul 2022, 11:15 UTC

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.

CVE-2022-30791 codesys vulnerability CVSS: 5.0 11 Jul 2022, 11:15 UTC

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

CVE-2022-32143 codesys vulnerability CVSS: 6.5 24 Jun 2022, 08:15 UTC

In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required

CVE-2022-32142 codesys vulnerability CVSS: 5.5 24 Jun 2022, 08:15 UTC

Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required.

CVE-2022-32141 codesys vulnerability CVSS: 4.0 24 Jun 2022, 08:15 UTC

Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required.

CVE-2022-32140 codesys vulnerability CVSS: 4.0 24 Jun 2022, 08:15 UTC

Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required.

CVE-2022-32139 codesys vulnerability CVSS: 4.0 24 Jun 2022, 08:15 UTC

In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required.

CVE-2022-32138 codesys vulnerability CVSS: 6.5 24 Jun 2022, 08:15 UTC

In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite.

CVE-2022-32137 codesys vulnerability CVSS: 6.5 24 Jun 2022, 08:15 UTC

In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required.

CVE-2022-32136 codesys vulnerability CVSS: 4.0 24 Jun 2022, 08:15 UTC

In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required.

CVE-2022-31806 codesys vulnerability CVSS: 6.8 24 Jun 2022, 08:15 UTC

In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.

CVE-2022-31805 codesys vulnerability CVSS: 4.3 24 Jun 2022, 08:15 UTC

In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.

CVE-2022-1965 codesys vulnerability CVSS: 5.5 24 Jun 2022, 08:15 UTC

Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.

CVE-2022-22519 codesys vulnerability CVSS: 5.0 07 Apr 2022, 19:15 UTC

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

CVE-2022-22518 codesys vulnerability CVSS: 6.4 07 Apr 2022, 19:15 UTC

A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy.

CVE-2022-22517 codesys vulnerability CVSS: 5.0 07 Apr 2022, 19:15 UTC

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

CVE-2022-22516 codesys vulnerability CVSS: 7.2 07 Apr 2022, 19:15 UTC

The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.

CVE-2022-22515 codesys vulnerability CVSS: 4.9 07 Apr 2022, 19:15 UTC

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

CVE-2022-22514 codesys vulnerability CVSS: 4.9 07 Apr 2022, 19:15 UTC

An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.

CVE-2022-22513 codesys vulnerability CVSS: 3.5 07 Apr 2022, 19:15 UTC

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.

CVE-2022-22510 codesys vulnerability CVSS: 5.0 02 Feb 2022, 13:15 UTC

Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of service (DoS) attack of an unauthenticated user via SNMP.

CVE-2021-34596 codesys vulnerability CVSS: 4.0 26 Oct 2021, 10:15 UTC

A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.

CVE-2021-34595 codesys vulnerability CVSS: 5.5 26 Oct 2021, 10:15 UTC

A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.

CVE-2021-34593 codesys vulnerability CVSS: 5.0 26 Oct 2021, 10:15 UTC

In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.

CVE-2021-34586 codesys vulnerability CVSS: 5.0 26 Oct 2021, 10:15 UTC

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.

CVE-2021-34585 codesys vulnerability CVSS: 5.0 26 Oct 2021, 10:15 UTC

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.

CVE-2021-34584 codesys vulnerability CVSS: 6.4 26 Oct 2021, 10:15 UTC

Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

CVE-2021-34583 codesys vulnerability CVSS: 5.0 26 Oct 2021, 10:15 UTC

Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

CVE-2021-21869 codesys vulnerability CVSS: 6.8 25 Aug 2021, 19:15 UTC

An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-21868 codesys vulnerability CVSS: 6.8 18 Aug 2021, 15:15 UTC

An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-21867 codesys vulnerability CVSS: 6.8 18 Aug 2021, 15:15 UTC

An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteArray functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-21863 codesys vulnerability CVSS: 6.8 05 Aug 2021, 20:15 UTC

A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-36765 codesys vulnerability CVSS: 5.0 04 Aug 2021, 14:15 UTC

In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system.

CVE-2021-36764 codesys vulnerability CVSS: 5.0 04 Aug 2021, 14:15 UTC

In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.

CVE-2021-36763 codesys vulnerability CVSS: 5.0 03 Aug 2021, 16:15 UTC

In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.

CVE-2021-33486 codesys vulnerability CVSS: 5.0 03 Aug 2021, 16:15 UTC

All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions.

CVE-2021-33485 codesys vulnerability CVSS: 7.5 03 Aug 2021, 16:15 UTC

CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.

CVE-2021-21866 codesys vulnerability CVSS: 6.8 02 Aug 2021, 21:15 UTC

A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-21865 codesys vulnerability CVSS: 6.8 02 Aug 2021, 21:15 UTC

A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-21864 codesys vulnerability CVSS: 6.8 02 Aug 2021, 21:15 UTC

A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

CVE-2021-30195 codesys vulnerability CVSS: 5.0 25 May 2021, 13:15 UTC

CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.

CVE-2021-30186 codesys vulnerability CVSS: 5.0 25 May 2021, 13:15 UTC

CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.

CVE-2021-30187 codesys vulnerability CVSS: 4.6 25 May 2021, 12:15 UTC

CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in an OS Command.

CVE-2021-29240 codesys vulnerability CVSS: 6.8 04 May 2021, 12:15 UTC

The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content.

CVE-2021-29242 codesys vulnerability CVSS: 7.5 03 May 2021, 14:15 UTC

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

CVE-2021-29241 codesys vulnerability CVSS: 5.0 03 May 2021, 14:15 UTC

CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).

CVE-2021-29239 codesys vulnerability CVSS: 4.6 03 May 2021, 14:15 UTC

CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity.

CVE-2021-29238 codesys vulnerability CVSS: 6.8 03 May 2021, 14:15 UTC

CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF).

CVE-2020-15806 codesys vulnerability CVSS: 5.0 22 Jul 2020, 19:15 UTC

CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.

CVE-2020-12068 codesys vulnerability CVSS: 6.4 14 May 2020, 21:15 UTC

An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.

CVE-2020-6081 codesys vulnerability CVSS: 6.5 07 May 2020, 13:15 UTC

An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability.

CVE-2019-5105 codesys vulnerability CVSS: 5.0 26 Mar 2020, 15:15 UTC

An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System).

CVE-2020-10245 codesys vulnerability CVSS: 10.0 26 Mar 2020, 04:15 UTC

CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.

CVE-2020-7052 codesys vulnerability CVSS: 4.0 24 Jan 2020, 20:15 UTC

CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.

CVE-2019-19789 codesys vulnerability CVSS: 4.0 20 Dec 2019, 13:15 UTC

3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.

CVE-2019-18858 codesys vulnerability CVSS: 7.5 20 Nov 2019, 18:15 UTC

CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.

CVE-2019-16265 codesys vulnerability CVSS: 7.5 25 Oct 2019, 17:15 UTC

CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.

CVE-2019-13538 codesys vulnerability CVSS: 6.8 17 Sep 2019, 20:15 UTC

3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only.

CVE-2019-13542 codesys vulnerability CVSS: 4.0 17 Sep 2019, 19:15 UTC

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.

CVE-2019-9009 codesys vulnerability CVSS: 5.0 17 Sep 2019, 16:15 UTC

An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.

CVE-2019-9008 codesys vulnerability CVSS: 6.5 17 Sep 2019, 14:15 UTC

An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.

CVE-2019-13548 codesys vulnerability CVSS: 7.5 13 Sep 2019, 17:15 UTC

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

CVE-2019-13532 codesys vulnerability CVSS: 5.0 13 Sep 2019, 17:15 UTC

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.

CVE-2019-9012 codesys vulnerability CVSS: 7.8 15 Aug 2019, 18:15 UTC

An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

CVE-2019-9010 codesys vulnerability CVSS: 7.5 15 Aug 2019, 18:15 UTC

An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

CVE-2019-9013 codesys vulnerability CVSS: 5.8 15 Aug 2019, 17:15 UTC

An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.

CVE-2018-20026 codesys vulnerability CVSS: 5.0 19 Feb 2019, 21:29 UTC

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

CVE-2018-20025 codesys vulnerability CVSS: 5.0 19 Feb 2019, 21:29 UTC

Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.

CVE-2018-10612 codesys vulnerability CVSS: 10.0 29 Jan 2019, 16:29 UTC

In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials.

CVE-2017-6027 codesys vulnerability CVSS: 7.5 19 May 2017, 03:29 UTC

An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A specially crafted web server request may allow the upload of arbitrary files (with a dangerous type) to the CODESYS Web Server without authorization which may allow remote code execution.

CVE-2017-6025 codesys vulnerability CVSS: 7.5 19 May 2017, 03:29 UTC

A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A malicious user could overflow the stack buffer by providing overly long strings to functions that handle the XML. Because the function does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.