Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.
References
Link | Resource |
---|---|
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= | Mitigation Vendor Advisory |
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= - Mitigation, Vendor Advisory |
Information
Published : 2022-06-24 08:15
Updated : 2024-11-21 06:41
NVD link : CVE-2022-1965
Mitre link : CVE-2022-1965
CVE.ORG link : CVE-2022-1965
JSON object : View
Products Affected
codesys
- plcwinnt
- runtime_toolkit
CWE
CWE-755
Improper Handling of Exceptional Conditions