CVE-2021-29242
03.05.2021, 14:15
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.Enginsight
Vendor | Product | Version |
---|---|---|
codesys | control_for_beaglebone_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_empc-a\/imx6_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_iot2000_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_linux_arm_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_linux_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_pfc100_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_pfc200_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_plcnext_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_raspberry_pi_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_for_wago_touch_panels_600_sl | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | control_rte | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | control_rte | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | control_runtime_system_toolkit | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | control_win | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | edge_gateway | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | edge_gateway | 3.0 ≤ 𝑥 < 4.1.0.0 |
codesys | embedded_target_visu_toolkit | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | gateway | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | hmi | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | opc_server | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | plchandler | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | remote_target_visu_toolkit | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | safety_sil | 3.0 ≤ 𝑥 < 3.5.17.0 |
codesys | simulation_runtime | 3.0 ≤ 𝑥 < 3.5.17.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References