CVE-2018-20026

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_runtime_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:opc_server:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:plchandler:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:targetvisu_sl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:00

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106251 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106251 - Broken Link, Third Party Advisory, VDB Entry
References () https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/ - Mitigation, Third Party Advisory () https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-036-codesys-control-v3-improper-communication-address-filtering/ - Mitigation, Third Party Advisory
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 - Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-18-352-04 - Third Party Advisory, US Government Resource

Information

Published : 2019-02-19 21:29

Updated : 2024-11-21 04:00


NVD link : CVE-2018-20026

Mitre link : CVE-2018-20026

CVE.ORG link : CVE-2018-20026


JSON object : View

Products Affected

codesys

  • control_for_raspberry_pi_sl
  • targetvisu_sl
  • development_system_v3
  • control_for_empc-a\/imx6_sl
  • control_for_pfc100_sl
  • safety_sil2
  • control_runtime_toolkit
  • opc_server
  • gateway
  • control_rte_sl_\(for_beckhoff_cx\)
  • control_for_linux_sl
  • control_rte_sl
  • hmi_sl
  • plchandler
  • control_for_pfc200_sl
  • control_for_iot2000_sl
  • control_for_beaglebone_sl
  • control_win_sl