CVE-2022-22515

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_rte_sl_\(for_beckhoff_cx\):*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*

Information

Published : 2022-04-07 19:15

Updated : 2022-05-12 19:37


NVD link : CVE-2022-22515

Mitre link : CVE-2022-22515


JSON object : View

Products Affected

codesys

  • control_for_linux_sl
  • control_for_empc-a\/imx6_sl
  • control_for_wago_touch_panels_600_sl
  • remote_target_visu_toolkit
  • control_rte_sl
  • development_system
  • control_for_raspberry_pi_sl
  • control_for_beckhoff_cx9020
  • control_rte_sl_\(for_beckhoff_cx\)
  • control_runtime_system_toolkit
  • control_for_plcnext_sl
  • control_for_pfc200_sl
  • control_win_sl
  • control_for_beaglebone_sl
  • control_for_pfc100_sl
  • control_for_iot2000_sl
  • hmi_sl
  • embedded_target_visu_toolkit
CWE
CWE-668

Exposure of Resource to Wrong Sphere