Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-37551 Explained : Impact and Mitigation

Learn about CVE-2023-37551, a vulnerability in multiple CODESYS products that allows unauthorized file downloads, compromising system integrity. Find out how to mitigate the risk and prevent exploitation.

Understanding CVE-2023-37551

This is a vulnerability identified in multiple CODESYS products that allows specially crafted network communication requests to download files with any file extensions to the controller, compromising the integrity of the CODESYS control runtime system.

What is CVE-2023-37551?

In multiple versions of CODESYS products, attackers can exploit the CmpApp component after successful user authentication to download files with any file extension to the controller, bypassing file type filtering normally done by the regular file download method (CmpFileTransfer).

The Impact of CVE-2023-37551

The integrity of the CODESYS control runtime system can be compromised by the files loaded onto the controller through this vulnerability.

Technical Details of CVE-2023-37551

Vulnerability Description

After successful authentication, specially crafted network communication requests can be used in multiple CODESYS products to download files with any file extension to the controller.

Affected Systems and Versions

        CODESYS Control for BeagleBone SL
        CODESYS Control for emPC-A/iMX6 SL
        CODESYS Control for IOT2000 SL
        CODESYS Control for Linux SL
        CODESYS Control for PFC100 SL
        CODESYS Control for PFC200 SL
        CODESYS Control for PLCnext SL
        CODESYS Control for Raspberry Pi SL
        CODESYS Control for WAGO Touch Panels 600 SL
        CODESYS Control RTE (for Beckhoff CX) SL
        CODESYS Control RTE (SL)
        CODESYS Control Runtime System Toolkit
        CODESYS Control Win (SL)
        CODESYS Development System V3
        CODESYS HMI (SL)
        CODESYS Safety SIL2 Runtime Toolkit

Exploitation Mechanism

Attackers can utilize the CmpApp component to download files with any file extensions to the controller, compromising the integrity of the CODESYS control runtime system.

Mitigation and Prevention

Immediate Steps to Take

Users of affected systems should update to versions higher than V4.10.0.0 for CODESYS Control products and higher than V3.5.19.20 for CODESYS Control RTE and related products.

Long-Term Security Practices

Regularly update CODESYS products and maintain stringent network access control measures to prevent unauthorized access.

Patching and Updates

Monitor official CODESYS channels for security patches and updates to address vulnerabilities like CVE-2023-37551.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now