CVE-2022-22515

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*

Information

Published : 2022-04-07 19:15

Updated : 2022-05-12 19:37


NVD link : CVE-2022-22515

Mitre link : CVE-2022-22515


JSON object : View

Products Affected

codesys

  • control_for_empc-a\/imx6_sl
  • embedded_target_visu_toolkit
  • development_system
  • control_for_pfc100_sl
  • control_rte_sl
  • control_for_raspberry_pi_sl
  • control_rte_sl_\(for_beckhoff_cx\)
  • control_runtime_system_toolkit
  • hmi_sl
  • control_for_iot2000_sl
  • control_for_beaglebone_sl
  • control_for_pfc200_sl
  • control_for_wago_touch_panels_600_sl
  • control_for_beckhoff_cx9020
  • control_for_linux_sl
  • remote_target_visu_toolkit
  • control_for_plcnext_sl
  • control_win_sl
CWE
CWE-668

Exposure of Resource to Wrong Sphere