{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T21:33:47.521","vulnerabilities":[{"cve":{"id":"CVE-2022-4224","sourceIdentifier":"info@cert.vde.com","published":"2023-03-23T12:15:12.990","lastModified":"2024-11-21T07:34:49.520","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1188"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-1188"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"40CAED29-E204-459D-8AFC-F814E68FAB9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"C5E9691E-E67A-4D59-9152-3731DD381CF4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"A5FC8BEB-DB37-4486-BAFD-16B82F331F9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"D2821B72-748A-4B3E-BD8B-E55C92A1A166"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"680C2604-3774-43D2-9DDE-38A0F593BFF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"D4B2CB47-68F3-4C17-8D61-88F655CF19ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"6E3514C8-F513-4576-8F6D-DDB193E3B947"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"5059640A-05F0-4D59-9682-BC09F155527C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"4.8.0.0","matchCriteriaId":"D7D13CFF-F753-430B-9E03-F3F24066B529"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"C27B4D20-FDE3-4003-97BD-F43EE147AD6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"63A8AFF5-3CC8-43FA-A9D3-A6A53FAF15FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"A1A44FED-CFBB-454A-B8E8-FC11A996488F"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"8297903A-80E1-4FA7-B552-672B94B6B6B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi_sl:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"57C60464-F6BB-431A-AD96-32B07FD99948"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"0032B82B-21B9-4006-A7E4-CD5B92962136"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0","versionEndExcluding":"3.5.19.0","matchCriteriaId":"B7181873-775F-43A6-BDBB-DBB2879C7D4D"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17553&token=cf49757d232ea8021f0c0dd6c65e71ea5942b12d&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}