Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
Stack-based buffer overflow in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via a crafted packet.
3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors that trigger an out-of-bounds memory access.
Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname.
Array index error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via a crafted packet.
Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier, as used on the ABB AC500 PLC and possibly other products, allows remote attackers to execute arbitrary code via a long URI to TCP port 8080.
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.
In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.
In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required
In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite.
In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required.
CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF).
An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability.
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.
3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only.
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.
Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required.
Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.
An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteArray functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content.
CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity.
Integer signedness error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to cause a denial of service via a crafted packet that triggers a heap-based buffer overflow.
Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate code of the encrypted boot application.
An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.
An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.
An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.
An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.
In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's password may be changed by an attacker without knowledge of the current password.
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.
The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of service (DoS) attack of an unauthenticated user via SNMP.
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system.
In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.
In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.
All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions.
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.
CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input.
CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.
An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System).
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
Multiple heap-based buffer overflows in 3S-Smart CODESYS Gateway Server before 2.3.9.34 allow remote attackers to execute arbitrary code via opcode (1) 0x3ef or (2) 0x3f0.
Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to execute arbitrary code via a large size value in the packet header, which triggers a heap-based buffer overflow.
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.
In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .
In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.
Smart Software Solutions (3S) CoDeSys Runtime Toolkit before 2.4.7.44 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2013-2781 | HIGH | Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote … | › |
| CVE-2012-4708 | HIGH | Stack-based buffer overflow in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to … | › |
| CVE-2012-4707 | HIGH | 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vect… | › |
| CVE-2012-4705 | HIGH | Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attacke… | › |
| CVE-2012-4704 | HIGH | Array index error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute ar… | › |
| CVE-2011-5007 | HIGH | Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier,… | › |
| CVE-2014-0769 | HIGH | The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoD… | › |
| CVE-2014-0760 | HIGH | The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with Co… | › |
| CVE-2024-41969 | HIGH | A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a mi… | › |
| CVE-2022-4046 | HIGH | In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a … | › |
| CVE-2023-3663 | HIGH | In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check… | › |
| CVE-2022-47390 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47389 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47388 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47387 | HIGH | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT… | › |
| CVE-2022-47386 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47385 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47384 | HIGH | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT… | › |
| CVE-2022-47383 | HIGH | An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp… | › |
| CVE-2022-47382 | HIGH | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT… | › |
| CVE-2022-47381 | HIGH | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple… | › |
| CVE-2022-47380 | HIGH | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multipl… | › |
| CVE-2022-47379 | HIGH | An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS pr… | › |
| CVE-2022-4224 | HIGH | In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize t… | › |
| CVE-2018-25048 | HIGH | The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a pa… | › |
| CVE-2022-32143 | HIGH | In multiple CODESYS products, file download and upload function allows access to internal files in t… | › |
| CVE-2022-32138 | HIGH | In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected si… | › |
| CVE-2022-32137 | HIGH | In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause … | › |
| CVE-2021-29238 | HIGH | CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF). | › |
| CVE-2020-6081 | HIGH | An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Softwar… | › |
| CVE-2019-9008 | HIGH | An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can tak… | › |
| CVE-2019-9013 | HIGH | An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based e… | › |
| CVE-2019-13538 | HIGH | 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows … | › |
| CVE-2025-41659 | HIGH | A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system a… | › |
| CVE-2022-32142 | HIGH | Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote… | › |
| CVE-2022-1965 | HIGH | Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker ma… | › |
| CVE-2022-22515 | HIGH | A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime sy… | › |
| CVE-2021-34595 | HIGH | A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2… | › |
| CVE-2025-41700 | HIGH | An unauthenticated attacker can trick a local user into executing arbitrary code by opening a delibe… | › |
| CVE-2020-12069 | HIGH | In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Contro… | › |
| CVE-2022-22516 | HIGH | The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system use… | › |
| CVE-2021-21869 | HIGH | An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData f… | › |
| CVE-2021-21868 | HIGH | An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes(… | › |
| CVE-2021-21867 | HIGH | An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteA… | › |
| CVE-2021-21863 | HIGH | A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality… | › |
| CVE-2021-21866 | HIGH | A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.Profile… | › |
| CVE-2021-21865 | HIGH | A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone… | › |
| CVE-2021-21864 | HIGH | A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureS… | › |
| CVE-2021-29240 | HIGH | The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of p… | › |
| CVE-2021-29239 | HIGH | CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embed… | › |
| CVE-2012-4706 | HIGH | Integer signedness error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to cau… | › |
| CVE-2022-4048 | HIGH | Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows … | › |
| CVE-2025-41738 | HIGH | An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime… | › |
| CVE-2025-41691 | HIGH | An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Co… | › |
| CVE-2025-1468 | HIGH | An unauthenticated remote attacker can gain access to sensitive information including authentication… | › |
| CVE-2024-8175 | HIGH | An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which … | › |
| CVE-2024-5000 | HIGH | An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to af… | › |
| CVE-2022-47391 | HIGH | In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a imprope… | › |
| CVE-2020-12067 | HIGH | In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's passw… | › |
| CVE-2022-30792 | HIGH | In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows … | › |
| CVE-2022-30791 | HIGH | In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an u… | › |
| CVE-2022-31805 | HIGH | In the CODESYS Development System multiple components in multiple versions transmit the passwords fo… | › |
| CVE-2022-31804 | HIGH | The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits.… | › |
| CVE-2022-22519 | HIGH | A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buff… | › |
| CVE-2022-22517 | HIGH | An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS prod… | › |
| CVE-2022-22510 | HIGH | Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of se… | › |
| CVE-2021-34593 | HIGH | In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated c… | › |
| CVE-2021-34586 | HIGH | In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer… | › |
| CVE-2021-34585 | HIGH | In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser err… | › |
| CVE-2021-34583 | HIGH | Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a den… | › |
| CVE-2021-36765 | HIGH | In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer derefer… | › |
| CVE-2021-36764 | HIGH | In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication r… | › |
| CVE-2021-36763 | HIGH | In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties. | › |
| CVE-2021-33486 | HIGH | All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version … | › |
| CVE-2021-30195 | HIGH | CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation. | › |
| CVE-2021-30191 | HIGH | CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input. | › |
| CVE-2021-30186 | HIGH | CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow. | › |
| CVE-2021-29241 | HIGH | CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of ser… | › |
| CVE-2020-15806 | HIGH | CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation. | › |
| CVE-2019-5105 | HIGH | An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S… | › |
| CVE-2019-9009 | HIGH | An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Cont… | › |
| CVE-2019-13532 | HIGH | CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted… | › |
| CVE-2019-9012 | HIGH | An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause u… | › |
| CVE-2018-20026 | HIGH | Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0. | › |
| CVE-2018-20025 | HIGH | Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0. | › |
| CVE-2015-6460 | HIGH | Multiple heap-based buffer overflows in 3S-Smart CODESYS Gateway Server before 2.3.9.34 allow remote… | › |
| CVE-2011-5008 | HIGH | Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attacke… | › |
| CVE-2021-34599 | HIGH | Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS … | › |
| CVE-2026-2364 | HIGH | If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Developm… | › |
| CVE-2023-3662 | HIGH | In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows f… | › |
| CVE-2023-3670 | HIGH | In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe di… | › |
| CVE-2021-29242 | HIGH | CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send cra… | › |
| CVE-2014-0757 | HIGH | Smart Software Solutions (3S) CoDeSys Runtime Toolkit before 2.4.7.44 allows remote attackers to cau… | › |