ID

VAR-202206-2040


CVE

CVE-2022-31803


TITLE

CODESYS Gateway Server Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

DESCRIPTION

In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact

Trust: 1.08

sources: NVD: CVE-2022-31803 // VULHUB: VHN-423672 // VULMON: CVE-2022-31803

AFFECTED PRODUCTS

vendor:codesysmodel:gatewayscope:gteversion:2.0

Trust: 1.0

vendor:codesysmodel:gatewayscope:ltversion:2.3.9.38

Trust: 1.0

sources: NVD: CVE-2022-31803

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-31803
value: MEDIUM

Trust: 1.0

info@cert.vde.com: CVE-2022-31803
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202206-2455
value: MEDIUM

Trust: 0.6

VULHUB: VHN-423672
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-31803
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-31803
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-423672
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

info@cert.vde.com: CVE-2022-31803
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803 // NVD: CVE-2022-31803

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

sources: VULHUB: VHN-423672 // NVD: CVE-2022-31803

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

PATCH

title:CODESYS Gateway Server Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=197311

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

EXTERNAL IDS

db:NVDid:CVE-2022-31803

Trust: 1.8

db:CNNVDid:CNNVD-202206-2455

Trust: 0.6

db:VULHUBid:VHN-423672

Trust: 0.1

db:VULMONid:CVE-2022-31803

Trust: 0.1

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803

REFERENCES

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download=

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2022-31803/

Trust: 0.6

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download=

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803

SOURCES

db:VULHUBid:VHN-423672
db:VULMONid:CVE-2022-31803
db:CNNVDid:CNNVD-202206-2455
db:NVDid:CVE-2022-31803

LAST UPDATE DATE

2024-08-14T15:00:55.543000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-423672date:2022-07-01T00:00:00
db:VULMONid:CVE-2022-31803date:2022-07-01T00:00:00
db:CNNVDid:CNNVD-202206-2455date:2022-07-04T00:00:00
db:NVDid:CVE-2022-31803date:2022-07-01T13:34:36.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-423672date:2022-06-24T00:00:00
db:VULMONid:CVE-2022-31803date:2022-06-24T00:00:00
db:CNNVDid:CNNVD-202206-2455date:2022-06-24T00:00:00
db:NVDid:CVE-2022-31803date:2022-06-24T08:15:07.463