This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote host is running a SCADA data gateway service that is
affected by a use-after-free vulnerability.
The remote host is running a version of CoDeSys Gateway Service prior
to version 184.108.40.206. It is, therefore, affected by a use-after-free
vulnerability that can be triggered by sending specially crafted packets
to the CoDeSys Gateway service listening on port 1211. Successful
exploitation may allow arbitrary code execution or result in a denial of
See also :
Upgrade CoDeSys Gateway to version 220.127.116.11
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false