Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
References
Link | Resource |
---|---|
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download= | Vendor Advisory |
https://www.tenable.com/security/research/tra-2021-47 | Exploit Third Party Advisory |
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download= | Vendor Advisory |
https://www.tenable.com/security/research/tra-2021-47 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download= - Vendor Advisory | |
References | () https://www.tenable.com/security/research/tra-2021-47 - Exploit, Third Party Advisory |
28 Oct 2021, 18:06
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
CPE | cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.tenable.com/security/research/tra-2021-47 - Exploit, Third Party Advisory | |
References | (CONFIRM) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16876&token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7&download= - Vendor Advisory |
26 Oct 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Oct 2021, 11:40
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-26 10:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34584
Mitre link : CVE-2021-34584
CVE.ORG link : CVE-2021-34584
JSON object : View
Products Affected
codesys
- codesys
CWE
CWE-126
Buffer Over-read