Home
MEDIUM: 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HDefault status
unaffected
3.5.21.0 (semver) before 3.5.21.40
affected
Default status
unaffected
3.5.21.0 (semver) before 3.5.21.40
affected
Default status
unaffected
3.5.21.0 (semver) before 3.5.21.40
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Default status
unaffected
4.15.0.0 (semver) before 4.19.0.0
affected
Description
An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.
Problem types
Product status
3.5.21.0 (semver) before 3.5.21.40
3.5.21.0 (semver) before 3.5.21.40
3.5.21.0 (semver) before 3.5.21.40
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
4.15.0.0 (semver) before 4.19.0.0
Credits
ABB AG
References
certvde.com/de/advisories/VDE-2025-099