HIGH · 7.5

CVE-2018-20026

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

Vulnerability Description

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
CodesysControl For Beaglebone Sl>= 3.0, < 3.5.14.0
CodesysControl For Empc-A\/Imx6 Sl>= 3.0, < 3.5.14.0
CodesysControl For Iot2000 Sl>= 3.0, < 3.5.14.0
CodesysControl For Linux Sl>= 3.0, < 3.5.14.0
CodesysControl For Pfc100 Sl>= 3.0, < 3.5.14.0
CodesysControl For Pfc200 Sl>= 3.0, < 3.5.14.0
CodesysControl For Raspberry Pi Sl>= 3.0, < 3.5.14.0
CodesysControl Rte Sl>= 3.0, < 3.5.14.0
CodesysControl Rte Sl \(For Beckhoff Cx\)>= 3.0, < 3.5.14.0
CodesysControl Runtime Toolkit>= 3.0, < 3.5.14.0
CodesysControl Win Sl>= 3.0, < 3.5.14.0
CodesysDevelopment System V3>= 3.0, < 3.5.14.0
CodesysGateway>= 3.0, < 3.5.14.0
CodesysHmi Sl>= 3.0, < 3.5.14.0
CodesysOpc Server>= 3.0, < 3.5.14.0
CodesysPlchandler>= 3.0, < 3.5.14.0
CodesysSafety Sil2>= 3.0, < 3.5.14.0
CodesysTargetvisu Sl>= 3.0, < 3.5.14.0

References

FAQ

What is CVE-2018-20026?

CVE-2018-20026 is a vulnerability with a CVSS score of 7.5 (HIGH). Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

How severe is CVE-2018-20026?

CVE-2018-20026 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-20026?

Check the references section above for vendor advisories and patch information. Affected products include: Codesys Control For Beaglebone Sl, Codesys Control For Empc-A\/Imx6 Sl, Codesys Control For Iot2000 Sl, Codesys Control For Linux Sl, Codesys Control For Pfc100 Sl.