Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37558
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37559
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer, which can lead to a denial-of-service condition.
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37555.
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37556.
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37555 and CVE-2023-37556.
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.
In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37553, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.
In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37549.
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37550
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37549 and CVE-2023-37550
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550
In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37546, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549, CVE-2023-37550
An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.
An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/CmpAppBP/CmpAppForce Components of multiple CODESYS products in multiple versions to read from an invalid address which can lead to a denial-of-service condition.
Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.
Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required.
Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required.
In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required.
In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required.
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.
The CmbWebserver.dll module of the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to create arbitrary directories under the web root by specifying a non-existent directory using \ (backslash) characters in an HTTP GET request.
An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system.
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.
An unauthenticated remote attacker can bypass the user management in CODESYS Visualization and read visualization template files or static elements by means of forced browsing.
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames.
All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information exposure allowing a remote, unauthenticated attacker to enumerate valid users.
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.
CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in an OS Command.
Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage of an improper implementation of the 3 way handshake during a TCP connection affecting the communications with commission and service tools. Specially crafted packets may also be sent to Port 2455/TCP/IP, used in Codesys management software, which may result in a denial-of-service condition of communications with commissioning and service tools.
3S-Smart CODESYS Gateway Server before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted (1) GET or (2) POST request.
Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request.
The CmpWebServer.dll module in the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to cause a denial of service (NULL pointer dereference) via (1) a crafted Content-Length in an HTTP POST or (2) an invalid HTTP request method.
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remote attacker to block consecutive logins of a specific type.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2025-0694 | MEDIUM | Insufficient path validation in CODESYS Control allows low privileged attackers with physical access… | › |
| CVE-2023-37559 | MEDIUM | After successful authentication as a user in multiple Codesys products in multiple versions, specifi… | › |
| CVE-2023-37558 | MEDIUM | After successful authentication as a user in multiple Codesys products in multiple versions, specifi… | › |
| CVE-2023-37557 | MEDIUM | After successful authentication as a user in multiple Codesys products in multiple versions, specifi… | › |
| CVE-2023-37556 | MEDIUM | In multiple versions of multiple Codesys products, after successful authentication as a user, specif… | › |
| CVE-2023-37555 | MEDIUM | In multiple versions of multiple Codesys products, after successful authentication as a user, specif… | › |
| CVE-2023-37554 | MEDIUM | In multiple versions of multiple Codesys products, after successful authentication as a user, specif… | › |
| CVE-2023-37553 | MEDIUM | In multiple versions of multiple Codesys products, after successful authentication as a user, specif… | › |
| CVE-2023-37552 | MEDIUM | In multiple versions of multiple Codesys products, after successful authentication as a user, specif… | › |
| CVE-2023-37551 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specia… | › |
| CVE-2023-37550 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2023-37549 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2023-37548 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2023-37547 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2023-37546 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2023-37545 | MEDIUM | In multiple Codesys products in multiple versions, after successful authentication as a user, specif… | › |
| CVE-2022-47393 | MEDIUM | An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of … | › |
| CVE-2022-47392 | MEDIUM | An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/Cm… | › |
| CVE-2022-47378 | MEDIUM | Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerabilit… | › |
| CVE-2022-32141 | MEDIUM | Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craf… | › |
| CVE-2022-32140 | MEDIUM | Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may cra… | › |
| CVE-2022-32139 | MEDIUM | In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an o… | › |
| CVE-2022-32136 | MEDIUM | In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read… | › |
| CVE-2022-22513 | MEDIUM | An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component o… | › |
| CVE-2021-34596 | MEDIUM | A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit … | › |
| CVE-2020-12068 | MEDIUM | An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS R… | › |
| CVE-2020-7052 | MEDIUM | CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation whi… | › |
| CVE-2019-19789 | MEDIUM | 3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.… | › |
| CVE-2019-13542 | MEDIUM | 3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows… | › |
| CVE-2011-5058 | MEDIUM | The CmbWebserver.dll module of the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attac… | › |
| CVE-2025-41739 | MEDIUM | An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communicat… | › |
| CVE-2025-41658 | MEDIUM | CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating … | › |
| CVE-2022-1794 | MEDIUM | The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration f… | › |
| CVE-2019-5106 | MEDIUM | A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockp… | › |
| CVE-2025-2595 | MEDIUM | An unauthenticated remote attacker can bypass the user management in CODESYS Visualization and read … | › |
| CVE-2019-9011 | MEDIUM | In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker ca… | › |
| CVE-2022-1989 | MEDIUM | All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information… | › |
| CVE-2022-31803 | MEDIUM | In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows… | › |
| CVE-2021-30187 | MEDIUM | CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in… | › |
| CVE-2018-8836 | MEDIUM | Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage o… | › |
| CVE-2015-6484 | MEDIUM | 3S-Smart CODESYS Gateway Server before 2.3.9.48 allows remote attackers to cause a denial of service… | › |
| CVE-2015-6482 | MEDIUM | Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause… | › |
| CVE-2011-5009 | MEDIUM | The CmpWebServer.dll module in the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attac… | › |
| CVE-2023-1620 | MEDIUM | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high priv… | › |
| CVE-2022-22508 | MEDIUM | Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remo… | › |