CoDeSys Gateway Service < 2.3.9.28 Use-After-Free

critical Nessus Plugin ID 66805

Synopsis

The remote host is running a SCADA data gateway service that is affected by a use-after-free vulnerability.

Description

The remote host is running a version of CoDeSys Gateway Service prior to version 2.3.9.28. It is, therefore, affected by a use-after-free vulnerability that can be triggered by sending specially crafted packets to the CoDeSys Gateway service listening on port 1211. Successful exploitation may allow arbitrary code execution or result in a denial of service condition.

Solution

Upgrade CoDeSys Gateway to version 2.3.9.28

See Also

https://www.codesys.com/download.html

Plugin Details

Severity: Critical

ID: 66805

File Name: scada_codesys_gateway_2_3_9_28.nbin

Version: 1.55

Type: remote

Family: SCADA

Published: 6/5/2013

Updated: 11/30/2022

Configuration: Enable thorough checks

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:3s-software:codesys_gateway-server

Required KB Items: SCADA/CoDeSys_Gateway

Exploit Ease: No known exploits are available

Patch Publication Date: 4/18/2013

Vulnerability Publication Date: 5/22/2013

Reference Information

CVE: CVE-2013-2781

BID: 60088

ICSA: 13-142-01