{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-16T22:17:29.021","vulnerabilities":[{"cve":{"id":"CVE-2022-47389","sourceIdentifier":"info@cert.vde.com","published":"2023-05-15T10:15:10.243","lastModified":"2025-07-17T13:09:56.670","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution."},{"lang":"es","value":"Un atacante remoto autenticado puede usar una vulnerabilidad de escritura fuera de los límites basada en la pila en el componente CmpTraceMgr de múltiples productos CODESYS en múltiples versiones para escribir datos en la pila, lo que puede provocar una condición de denegación de servicio, sobrescritura de memoria o ejecución remota de código."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"D2A50DA7-2372-470C-A4DD-29837A4D428A"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"0ADC5883-5087-45E0-95E2-3D414C6417DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"7178B980-82CC-4A30-B278-A4D1F319D678"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"8AFD0474-DCBC-4F9E-BE1B-7BDCCB9D801F"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"61D99F13-9297-4812-90AD-3EB43276D344"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"E5F2E302-39C1-4674-A2BE-A6D1D761B4E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"FF8FBED1-D729-4E07-A644-70D8FC87E965"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"00EF8A8D-8A5F-4E7B-A14A-BFEE3297E3B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.0.0","matchCriteriaId":"2AA9F089-875B-4A90-A818-1BD06602D7E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_\\(for_beckhoff_cx\\)_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"F1A18AA8-CDF4-4664-906F-76060AFED925"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte_\\(sl\\):*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"725E570C-6F46-4526-90B5-F4CAF70A7688"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"AD993BD6-B52E-4BA7-A7D7-A0EBE7FDEDEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_\\(sl\\):*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"FBA9CDA8-4FA0-4258-B477-D2C8DBDD8B2F"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"FC41CB40-21CD-4621-9B23-9BF8E0AE93E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi_\\(sl\\):*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"C664BC1C-889F-4A54-8E81-AB60B0D4D93B"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:safety_sil2_psp:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"49220E0D-3DD6-492B-BD58-C4951D7D2B75"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:safety_sil2_runtime_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.0","matchCriteriaId":"DDF04E45-90A5-47FB-8101-9A56BD4F9C3F"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}