This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote host is running a SCADA data gateway service that is
affected by a use-after-free vulnerability.
The remote host is running a version of CoDeSys Gateway Service prior
to version 18.104.22.168. It is, therefore, affected by a use-after-free
vulnerability that can be triggered by sending specially crafted packets
to the CoDeSys Gateway service listening on port 1211. Successful
exploitation may allow arbitrary code execution or result in a denial of
See also :
Upgrade CoDeSys Gateway to version 22.214.171.124
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false