-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
NVD Vulnerability Details :
CVE-2021-33485
Analyzed
More Info
Official Page
Source
-
cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At
-
03 Aug, 2021 | 16:15
Updated At
-
17 Aug, 2021 | 13:14
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
N/A
Date Added:
N/A
Due Date:
N/A
Vulnerability Name:
N/A
Required Action:
N/A
Metrics
Type
Version
Base score
Base severity
Vector
Primary
3.1
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary
2.0
7.5
HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type:
Primary
Version:
3.1
Base score:
9.8
Base severity:
CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type:
Primary
Version:
2.0
Base score:
7.5
Base severity:
HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:beaglebone_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:empc-a\/imx6_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:iot2000_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions up to 4.2.0.0(inclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:linux_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:pfc100_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:pfc200_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:plcnext_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:raspberry_pi_sl:*:*
CODESYS GmbH
codesys
>>
control
>>
Versions before 4.2.0.0(exclusive)
cpe:2.3:a:codesys:control:*:*:*:*:*:wago_touch_panels_600_sl:*:*
CODESYS GmbH
codesys
>>
control_rte
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:control_rte:*:*:*:*:*:-:*:*
CODESYS GmbH
codesys
>>
control_rte
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:control_rte:*:*:*:*:*:beckhoff_cx:*:*
CODESYS GmbH
codesys
>>
control_runtime_system_toolkit
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*
CODESYS GmbH
codesys
>>
control_win_sl
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*
CODESYS GmbH
codesys
>>
embedded_target_visu_toolkit
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*
CODESYS GmbH
codesys
>>
hmi
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*
CODESYS GmbH
codesys
>>
remote_target_visu_toolkit
>>
Versions before 3.5.17.10(exclusive)
cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
CWE-787
Primary
nvd@nist.gov
CWE ID:
CWE-787
Type:
Primary
Source:
nvd@nist.gov
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=
cve@mitre.org
Vendor Advisory
Hyperlink:
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14805&token=f0b86f99bb302ddd4aadec483aed5f5d3fddbf1a&download=
Source:
cve@mitre.org
Resource:
Vendor Advisory
Change History
0
Changes found
Details not found