Vulnerability Details : CVE-2022-22519
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
Products affected by CVE-2022-22519
- cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
- cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-22519
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 66 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-22519
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
CERT VDE | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2022-22519
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Secondary)
-
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.Assigned by: info@cert.vde.com (Primary)
References for CVE-2022-22519
Jump to