CoDeSys Gateway Service < Use-After-Free

Critical Nessus Plugin ID 66805


The remote host is running a SCADA data gateway service that is affected by a use-after-free vulnerability.


The remote host is running a version of CoDeSys Gateway Service prior to version It is, therefore, affected by a use-after-free vulnerability that can be triggered by sending specially crafted packets to the CoDeSys Gateway service listening on port 1211. Successful exploitation may allow arbitrary code execution or result in a denial of service condition.


Upgrade CoDeSys Gateway to version

See Also

Plugin Details

Severity: Critical

ID: 66805

File Name: scada_codesys_gateway_2_3_9_28.nbin

Version: $Revision: 1.21 $

Type: remote

Family: SCADA

Published: 2013/06/05

Modified: 2018/01/29

Dependencies: 65193

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:3s-software:codesys_gateway-server

Required KB Items: SCADA/CoDeSys_Gateway

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/18

Vulnerability Publication Date: 2013/05/22

Reference Information

CVE: CVE-2013-2781

BID: 60088

OSVDB: 93603

ICSA: 13-142-01