Share: Email | Twitter

ID

VDE-2024-059

Published

2024-12-03 08:00 (CET)

Last update

2024-11-29 10:47 (CET)

Vendor(s)

Festo SE & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
CODESYS provided by Festo all versions

Summary

An unauthenticated attacker would be able to send crafted requests to cause the CODESYS Gateway Server V2 to allocate excessive memory or consume all available TCP client connections. Besides, passwords are insufficiently checked during login.

All versions of the following CODESYS V2 product prior version V2.3.9.38 are affected:

  • CODESYS Gateway Server

Vulnerabilities



Last Update
Sept. 14, 2022, 4:50 p.m.
Weakness
Partial String Comparison (CWE-187)
Summary

In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password.

Last Update
Sept. 14, 2022, 4:51 p.m.
Weakness
Memory Allocation with Excessive Size Value (CWE-789)
Summary

The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.

Last Update
Sept. 14, 2022, 4:51 p.m.
Weakness
Uncontrolled Resource Consumption (CWE-400)
Summary

In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.

Impact

The identified vulnerabilities could lead to denial-of-service attacks, exhaustion of TCP connections, and unauthorized access to the system.

Solution

Mitigation

For all CVEs: Enable password protection at login in case no password is set at the controller. Please note that the password configuration file is not covered via default FFT backup & Restore mechanism, you must select the related file manually.

Reported by

CERT@VDE coordinated with Festo