Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:MISC:CODESYS-CMPWEBSVR-BO

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

CoDeSys V3 CmpWebServer And CmpWebServerHandler Heap Buffer Overflow

Release Date

2020/01/05

Update Number

3241

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: CoDeSys V3 CmpWebServer And CmpWebServerHandler Heap Buffer Overflow


This signature detects attempts to exploit a known vulnerability against CoDeSys V3 runtime system's web server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.

Affected Products

  • Codesys control_for_beaglebone -
  • Codesys control_for_empc-a/imx6 -
  • Codesys control_for_iot2000 -
  • Codesys control_for_linux -
  • Codesys control_for_pfc100 -
  • Codesys control_for_pfc200 -
  • Codesys control_for_plcnext -
  • Codesys control_for_raspberry_pi -
  • Codesys control_rte -
  • Codesys control_rte 3.0
  • Codesys control_rte 3.5.8.60
  • Codesys control_runtime_system_toolkit -
  • Codesys control_runtime_system_toolkit 3.0
  • Codesys control_win -
  • Codesys control_win 3.0
  • Codesys control_win 3.5.9.80
  • Codesys hmi -
  • Codesys hmi 3.0
  • Codesys hmi 3.5.10.0

References

  • CVE: CVE-2019-18858

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out