A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17089&token=cc5041e24fc744a397a6f6e3b78200a40e6fcd53&download= - Vendor Advisory |
Information
Published : 2022-04-07 19:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22515
Mitre link : CVE-2022-22515
CVE.ORG link : CVE-2022-22515
JSON object : View
Products Affected
codesys
- control_for_raspberry_pi_sl
- control_for_beckhoff_cx9020
- control_for_empc-a\/imx6_sl
- control_for_pfc100_sl
- control_runtime_system_toolkit
- remote_target_visu_toolkit
- embedded_target_visu_toolkit
- control_rte_sl_\(for_beckhoff_cx\)
- control_for_linux_sl
- control_rte_sl
- control_for_wago_touch_panels_600_sl
- hmi_sl
- control_for_pfc200_sl
- control_for_iot2000_sl
- development_system
- control_for_plcnext_sl
- control_for_beaglebone_sl
- control_win_sl
CWE
CWE-668
Exposure of Resource to Wrong Sphere