In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Oct/64 | Mailing List Third Party Advisory |
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175&download= | Vendor Advisory |
http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Oct/64 | Mailing List Third Party Advisory |
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175&download= | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2021/Oct/64 - Mailing List, Third Party Advisory | |
References | () https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175&download= - Vendor Advisory |
12 Apr 2022, 18:05
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry | |
References | (MISC) http://packetstormsecurity.com/files/165874/WAGO-750-8xxx-PLC-Denial-Of-Service-User-Enumeration.html - Exploit, Third Party Advisory, VDB Entry |
04 Feb 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Nov 2021, 20:04
Type | Values Removed | Values Added |
---|---|---|
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/64 - Mailing List, Third Party Advisory | |
References | (MISC) http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html - Third Party Advisory, VDB Entry |
17 Nov 2021, 22:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2021, 01:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Nov 2021, 15:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:* | |
References | (MISC) http://packetstormsecurity.com/files/164716/CODESYS-2.4.7.0-Denial-Of-Service.html - Third Party Advisory, VDB Entry | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/64 - Mailing List, Third Party Advisory |
01 Nov 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Oct 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Oct 2021, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:* cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (CONFIRM) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175&download= - Vendor Advisory |
26 Oct 2021, 11:40
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-26 10:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34593
Mitre link : CVE-2021-34593
CVE.ORG link : CVE-2021-34593
JSON object : View
Products Affected
codesys
- runtime_toolkit
- plcwinnt
CWE
CWE-755
Improper Handling of Exceptional Conditions