CVE-2022-22515
Published Apr 7, 2022
Last updated 3 years ago
Overview
- Description
- A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
- Source
- info@cert.vde.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 4.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:P/A:N
Weaknesses
- info@cert.vde.com
- CWE-668
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C0588BE-2046-48F8-95E9-338FB009E2FA", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB8984E-ED1F-4F52-B016-F08C0D085C64", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "412EBC80-0D9C-419F-9DC3-E2054A8B93B0", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB585AB5-D0AC-46DC-9723-A0FEFBFB015C", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A78E493B-6D9E-4196-830C-24BCF25D3D44", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66AAE46-CCF8-46D6-89AD-5A4461FCECE9", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D5DE9D1-C334-452C-A64B-D74A48017B6D", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB1C57CE-152A-44AE-98B8-39E310255C8E", "versionEndExcluding": "4.5.0.0" }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01A94C91-B155-4A5A-9F0B-F7E04F3B23B5", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95BC26CF-75EE-43A2-8A92-E877CAF612F3", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D85A5BC-ADB6-40E4-9434-B57C99185BBA", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC013B85-98C0-4EF0-844C-4C75D1D237D9", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25737EE6-531E-4241-AA40-856388A2E333", "versionEndExcluding": "3.5.18.0", "versionStartIncluding": "3.0" }, { "criteria": "cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9F1B30B-6D52-40B1-ABD3-5164A76F5447", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60E8930A-4C6C-41CE-8BA8-97332DC753FF", "versionEndExcluding": "3.5.18.0" }, { "criteria": "cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "879A9478-54E4-4B6E-A6DC-6DDE1C5E7745", "versionEndExcluding": "3.5.18.0" } ], "operator": "OR" } ] } ]