7.3
CVSSv3

CVE-2021-29242

Published: 03/05/2021 Updated: 14/09/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 7.3 | Impact Score: 3.4 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

CODESYS Control Runtime system prior to 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

codesys control for beaglebone sl

codesys control for empc-a\\/imx6 sl

codesys control for iot2000 sl

codesys control for linux arm sl

codesys control for linux sl

codesys control for pfc100 sl

codesys control for pfc200 sl

codesys control for plcnext sl

codesys control for raspberry pi sl

codesys control for wago touch panels 600 sl

codesys control rte

codesys control runtime system toolkit

codesys control win

codesys edge gateway

codesys embedded target visu toolkit

codesys gateway

codesys hmi

codesys opc server

codesys plchandler

codesys remote target visu toolkit

codesys safety sil

codesys simulation runtime