Show filters
72 Total Results
Displaying 41-50 of 72
Sort by:
Attacker Value
Unknown

CVE-2020-12069

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Attacker Value
Unknown

CVE-2022-30791

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-30792

Disclosure Date: July 08, 2022 (last updated February 24, 2025)
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.
0
Attacker Value
Unknown

CVE-2022-22515

Disclosure Date: June 01, 2022 (last updated February 23, 2025)
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
0
Attacker Value
Unknown

CVE-2022-22518

Disclosure Date: April 06, 2022 (last updated February 23, 2025)
A bug in CmpUserMgr component can lead to only partially applied security policies. This can result in enabled, anonymous access to components part of the applied security policy.
0
Attacker Value
Unknown

CVE-2022-22519

Disclosure Date: April 06, 2022 (last updated February 23, 2025)
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.
Attacker Value
Unknown

CVE-2022-22517

Disclosure Date: April 06, 2022 (last updated February 23, 2025)
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.
Attacker Value
Unknown

CVE-2022-22514

Disclosure Date: April 06, 2022 (last updated February 23, 2025)
An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.
Attacker Value
Unknown

CVE-2022-22513

Disclosure Date: April 06, 2022 (last updated February 23, 2025)
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.
Attacker Value
Unknown

CVE-2021-38545

Disclosure Date: August 11, 2021 (last updated November 28, 2024)
Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.