{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T04:27:41.246","vulnerabilities":[{"cve":{"id":"CVE-2022-4046","sourceIdentifier":"info@cert.vde.com","published":"2023-08-03T13:15:09.627","lastModified":"2024-11-21T07:34:30.347","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"2390BDA5-FC7C-43F2-A6D0-098DE49E8092"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"07DC0FD5-57BB-41CD-9FFD-36FEC5573BFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"BE2276F0-8EF2-4CEA-9A75-010D31F8D76C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"DB41ACE5-0064-4BBC-AEF7-2A89D21EEA83"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"D23780DF-5CF3-4D88-83A4-D5D0E6BF7274"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"0CAF552D-E704-4979-9335-6290F11D6EA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"31A0FF97-A6E5-4339-B68A-E1F76A24D50E"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"BC1C54A7-686C-433C-91B0-B84720ABFC81"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"B1B0A7F9-9F70-4217-AF38-14E9F9F7CDDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"D2102923-8711-4D2C-BF3E-870AC1D8F2AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*","matchCriteriaId":"98918E65-854F-4719-8419-79578C5F9EAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*","matchCriteriaId":"07750392-D8FF-413D-82F9-55B9F2F12B55"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"EE76A4D8-070C-45D7-AF3B-12FFD6BD73E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*","matchCriteriaId":"23B980AB-A690-43C0-A117-929C4AD7A2DF"}]}]}],"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2023-025/","source":"info@cert.vde.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://cert.vde.com/en/advisories/VDE-2023-025/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory"]}]}}]}