{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T01:08:16.283","vulnerabilities":[{"cve":{"id":"CVE-2019-13542","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2019-09-17T19:15:10.757","lastModified":"2024-11-21T04:25:06.737","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition."},{"lang":"es","value":"3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, todas las versiones desde 3.5.11.0 hasta 3.5.15.0, permite a un atacante enviar peticiones diseñadas desde un cliente OPC UA confiable que causa una desreferencia del puntero NULL, lo que puede desencadenar una condición de denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"ics-cert@hq.dhs.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"71439C06-3F84-4AC4-AC41-4E0AB9AC210C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"11BD175F-8CBB-45A0-870D-E56E6B57FBB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"2EA5147D-D5AB-4352-95EE-0D90C80781B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"45DBEFC0-1336-4170-8EA7-A6871AC505CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"1C5F1F99-93B3-4F16-B864-023F956601FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"2AF22400-3C26-4D90-AC04-FCAC171EE435"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"67E16675-C26E-43C4-9140-CCA4E466C693"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"E32E1F58-72F8-410B-A8C3-7E8DEA67D4A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:linux:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"40343F22-A7DB-4EFF-A58C-957128A7AC96"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:runtime_system_toolkit:*:*:*:*:*:*:*:*","versionStartIncluding":"3.5.11.0","versionEndExcluding":"3.5.15.0","matchCriteriaId":"CC74338D-F093-4D49-B56D-3EF17232F98A"}]}]}],"references":[{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-255-04","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-19-255-04","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}