Total vulnerabilities in the database
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Software | From | Fixed in |
---|---|---|
codesys / control_for_beaglebone_sl | - | 4.5.0.0 |
codesys / control_for_beckhoff_cx9020 | - | 4.5.0.0 |
codesys / control_for_empc-a/imx6_sl | - | 4.5.0.0 |
codesys / control_for_iot2000_sl | - | 4.5.0.0 |
codesys / control_for_linux_sl | - | 4.5.0.0 |
codesys / control_for_pfc100_sl | - | 4.5.0.0 |
codesys / control_for_pfc200_sl | - | 4.5.0.0 |
codesys / control_for_plcnext_sl | - | 4.5.0.0 |
codesys / control_for_raspberry_pi_sl | - | 4.5.0.0 |
codesys / control_for_wago_touch_panels_600_sl | - | 4.5.0.0 |
codesys / control_rte_sl | - | 3.5.18.0 |
codesys / control_rte_sl_(for_beckhoff_cx) | - | 3.5.18.0 |
codesys / control_win_sl | - | 3.5.18.0 |
codesys / control_runtime_system_toolkit | - | 3.5.18.0 |
codesys / edge_gateway | - | 4.5.0.0 |
codesys / edge_gateway | - | 3.5.18.0 |
codesys / embedded_target_visu_toolkit | - | 3.5.18.0 |
codesys / gateway | - | 3.5.18.0 |
codesys / hmi_sl | - | 3.5.18.0 |
codesys / remote_target_visu_toolkit | - | 3.5.18.0 |
codesys / development_system | 3.0 | 3.5.18.0 |