{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:34:09.414","vulnerabilities":[{"cve":{"id":"CVE-2022-32139","sourceIdentifier":"info@cert.vde.com","published":"2022-06-24T08:15:07.900","lastModified":"2024-11-21T07:05:49.570","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required."},{"lang":"es","value":"En diversos productos de CODESYS, un atacante remoto poco privilegiado puede diseñar una petición que cause una lectura fuera de los límites, resultando en una situación de denegación de servicio. No es requerida una interacción del usuario"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.4.7.57","matchCriteriaId":"2B26FF87-3FCD-496E-97C5-A1E4F6AACCB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*","versionStartIncluding":"2.0","versionEndExcluding":"2.4.7.57","matchCriteriaId":"CF74E74E-4EF8-4C84-A9A1-612AB7FC88BA"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=","source":"info@cert.vde.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}