We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-41969

WAGO: CODESYS V3 Configuration Authentication Bypass in Multiple Devices



AssignerCERTVDE
Reserved2024-07-25
Published2024-11-18
Updated2024-11-18

Description

A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.



HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0
affected

Default status
unaffected

0.0.0 before 3.10.11
affected

Default status
unaffected

0.0.0 before 3.10.11
affected

Credits

Diego Giubertoni finder

Nozomi Networks reporter

References

https://cert.vde.com/en/advisories/VDE-2024-047

cve.org CVE-2024-41969

nvd.nist.gov CVE-2024-41969

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-41969
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.