{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T17:32:23.388","vulnerabilities":[{"cve":{"id":"CVE-2022-32141","sourceIdentifier":"info@cert.vde.com","published":"2022-06-24T08:15:08.027","lastModified":"2024-11-21T07:05:49.833","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required."},{"lang":"es","value":"Diversos productos CODESYS son propensos a una lectura excesiva del buffer. Un atacante remoto poco privilegiado puede diseñar una petición con un desplazamiento no válido, que puede causar una sobre lectura del búfer interno, resultando en una condición de denegación de servicio. No es requerida una interacción del usuario"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-126"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.4.7.57","matchCriteriaId":"2B26FF87-3FCD-496E-97C5-A1E4F6AACCB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*","versionStartIncluding":"2.0","versionEndExcluding":"2.4.7.57","matchCriteriaId":"CF74E74E-4EF8-4C84-A9A1-612AB7FC88BA"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=","source":"info@cert.vde.com","tags":["Mitigation","Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"]}]}}]}