CVE-2020-10245
Published Mar 26, 2020
Last updated 5 years ago
Overview
- Description
- CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EA61ACB-5690-42D7-8420-E77E58D5BA4D", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5FB5ED1-0B3C-4426-AC3E-621C230AE38C", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1477C3BF-2636-4D41-B951-CED7CAE6731A", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82047F2C-2D3D-4D6C-9DAE-512BD9639747", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E832FD04-9206-4881-8695-8FA7FE788EE7", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C21D2A80-B830-483F-A748-2F082D369C73", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CD92E41-9C0A-47E0-8B90-181A2ECC4627", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "491C7EFF-D620-40EB-B112-9D0B2AC62B76", "versionEndExcluding": "3.5.15.40" }, { "criteria": "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75BA05C4-3066-4354-9F99-232D181D0CA6", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.5.8.60" }, { "criteria": "cpe:2.3:a:codesys:control_rte:*:*:*:*:*:beckhoff_cx:*:*", "vulnerable": true, "matchCriteriaId": "D3281307-8315-42A5-84FD-C683C54B603A", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.5.8.60" }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E095D809-8408-4FEE-874F-1F021EC7E97E", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.0" }, { "criteria": "cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43EBED50-DFA9-430B-8B3C-8994E2E43470", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.5.9.80" }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93ACEEA3-B958-4070-86F0-5C84869A13E7", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.0" }, { "criteria": "cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4CF0416-A09F-46CF-8285-A46E7F1A2F8C", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.5.10.0" }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBC06C9A-3D60-46FF-BCF4-B1C472DB3850", "versionEndExcluding": "3.5.15.40", "versionStartIncluding": "3.0" } ], "operator": "OR" } ] } ]