{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T17:20:02.793","vulnerabilities":[{"cve":{"id":"CVE-2022-22517","sourceIdentifier":"info@cert.vde.com","published":"2022-04-07T19:15:08.300","lastModified":"2024-11-21T06:46:56.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed."},{"lang":"es","value":"Un atacante remoto no autenticado puede interrumpir los canales de comunicación presentes entre los productos CODESYS al adivinar un ID de canal válido e inyectando paquetes. Esto hace que el canal de comunicación sea cerrado"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-334"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"5C0588BE-2046-48F8-95E9-338FB009E2FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beckhoff_cx9020:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"45FF3C0B-9043-4E82-A8F3-95CB79D8DAA1"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"4CB8984E-ED1F-4F52-B016-F08C0D085C64"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"412EBC80-0D9C-419F-9DC3-E2054A8B93B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"AB585AB5-D0AC-46DC-9723-A0FEFBFB015C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"4F6E2A1D-0187-4C71-A87D-48B3EC3D99DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"A78E493B-6D9E-4196-830C-24BCF25D3D44"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"F66AAE46-CCF8-46D6-89AD-5A4461FCECE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"9D5DE9D1-C334-452C-A64B-D74A48017B6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"AB1C57CE-152A-44AE-98B8-39E310255C8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"01A94C91-B155-4A5A-9F0B-F7E04F3B23B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"95BC26CF-75EE-43A2-8A92-E877CAF612F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"1D85A5BC-ADB6-40E4-9434-B57C99185BBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"AC013B85-98C0-4EF0-844C-4C75D1D237D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.18.0","matchCriteriaId":"25737EE6-531E-4241-AA40-856388A2E333"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:windows:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"780B6607-72A7-487E-A180-5C9A49BF6355"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:edge_gateway:*:*:*:*:*:linux:*:*","versionEndExcluding":"4.5.0.0","matchCriteriaId":"E36291AE-21CB-4ECB-8816-D50712C70E30"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"E9F1B30B-6D52-40B1-ABD3-5164A76F5447"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:gateway:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"5C264A88-C41C-400B-9C69-0DBB1CEB9DF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"60E8930A-4C6C-41CE-8BA8-97332DC753FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.18.0","matchCriteriaId":"879A9478-54E4-4B6E-A6DC-6DDE1C5E7745"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17091&token=c450f8bbbd838c647d102f359356386c6ea5aeca&download=","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17091&token=c450f8bbbd838c647d102f359356386c6ea5aeca&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}