The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.
References
Configurations
History
21 Nov 2024, 07:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download= - Vendor Advisory |
01 Jul 2022, 13:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | (CONFIRM) https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download= - Vendor Advisory | |
| CPE | cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
24 Jun 2022, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-06-24 08:15
Updated : 2024-11-21 07:05
NVD link : CVE-2022-31804
Mitre link : CVE-2022-31804
CVE.ORG link : CVE-2022-31804
JSON object : View
Products Affected
codesys
- gateway
CWE
CWE-789
Memory Allocation with Excessive Size Value
