ID

VAR-202105-1033


CVE

CVE-2021-29242


TITLE

3s-smart Software Solutions CODESYS Control Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202105-050

DESCRIPTION

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages. 3s-smart Software Solutions CODESYS Control is a set of industrial control program programming software from 3S-Smart Software Solutions (3s-smart Software Solutions) company in Germany

Trust: 1.08

sources: NVD: CVE-2021-29242 // VULHUB: VHN-388815 // VULMON: CVE-2021-29242

AFFECTED PRODUCTS

vendor:codesysmodel:control for linux arm slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for pfc200 slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control rtescope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:control runtime system toolkitscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:hmiscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:control runtime system toolkitscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for plcnext slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for linux arm slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for pfc200 slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:hmiscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:remote target visu toolkitscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:edge gatewayscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:safety silscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:edge gatewayscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:plchandlerscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:simulation runtimescope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:control for plcnext slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control rtescope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:safety silscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for beaglebone slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:gatewayscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:simulation runtimescope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for beaglebone slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:gatewayscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for empc-a\/imx6 slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for wago touch panels 600 slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:embedded target visu toolkitscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:plchandlerscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for iot2000 slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for wago touch panels 600 slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for iot2000 slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for pfc100 slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:opc serverscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:control for linux slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for raspberry pi slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for pfc100 slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:control for empc-a\/imx6 slscope:ltversion:4.1.0.0

Trust: 1.0

vendor:codesysmodel:embedded target visu toolkitscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:opc serverscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for linux slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control for raspberry pi slscope:gteversion:3.0

Trust: 1.0

vendor:codesysmodel:control winscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:remote target visu toolkitscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:edge gatewayscope:ltversion:3.5.17.0

Trust: 1.0

vendor:codesysmodel:control winscope:gteversion:3.0

Trust: 1.0

sources: NVD: CVE-2021-29242

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-29242
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202105-050
value: HIGH

Trust: 0.6

VULHUB: VHN-388815
value: HIGH

Trust: 0.1

VULMON: CVE-2021-29242
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-29242
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-388815
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-29242
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 3.4
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-388815 // VULMON: CVE-2021-29242 // CNNVD: CNNVD-202105-050 // NVD: CVE-2021-29242

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-388815 // NVD: CVE-2021-29242

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-050

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202105-050

PATCH

title:3s-smart Software Solutions CODESYS Control Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=150530

Trust: 0.6

sources: CNNVD: CNNVD-202105-050

EXTERNAL IDS

db:NVDid:CVE-2021-29242

Trust: 1.8

db:CNNVDid:CNNVD-202105-050

Trust: 0.6

db:VULHUBid:VHN-388815

Trust: 0.1

db:VULMONid:CVE-2021-29242

Trust: 0.1

sources: VULHUB: VHN-388815 // VULMON: CVE-2021-29242 // CNNVD: CNNVD-202105-050 // NVD: CVE-2021-29242

REFERENCES

url:https://customers.codesys.com/index.php

Trust: 1.8

url:https://www.codesys.com/security/security-reports.html

Trust: 1.8

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-29242

Trust: 0.6

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=14640&token=623b6fceb0579ef0f7505e29beefa5b3f8ac7873&download=

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-388815 // VULMON: CVE-2021-29242 // CNNVD: CNNVD-202105-050 // NVD: CVE-2021-29242

SOURCES

db:VULHUBid:VHN-388815
db:VULMONid:CVE-2021-29242
db:CNNVDid:CNNVD-202105-050
db:NVDid:CVE-2021-29242

LAST UPDATE DATE

2024-08-14T15:27:45.730000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-388815date:2021-09-14T00:00:00
db:VULMONid:CVE-2021-29242date:2021-05-13T00:00:00
db:CNNVDid:CNNVD-202105-050date:2021-05-14T00:00:00
db:NVDid:CVE-2021-29242date:2021-09-14T18:18:36.333

SOURCES RELEASE DATE

db:VULHUBid:VHN-388815date:2021-05-03T00:00:00
db:VULMONid:CVE-2021-29242date:2021-05-03T00:00:00
db:CNNVDid:CNNVD-202105-050date:2021-05-03T00:00:00
db:NVDid:CVE-2021-29242date:2021-05-03T14:15:07.667