This script is Copyright (C) 2013-2015 Tenable Network Security, Inc.
The remote host is running a SCADA data gateway service that is
affected by a use-after-free vulnerability.
The remote host is running a version of CoDeSys Gateway Service prior
to version 184.108.40.206. It is, therefore, affected by a use-after-free
vulnerability that can be triggered by sending specially crafted packets
to the CoDeSys Gateway service listening on port 1211. Successful
exploitation may allow arbitrary code execution or result in a denial of
See also :
Upgrade CoDeSys Gateway to version 220.127.116.11
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false
Nessus Plugin ID: 66805 ()
Bugtraq ID: 60088
CVE ID: CVE-2013-2781
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.