Learn about CVE-2023-37551, a vulnerability in multiple CODESYS products that allows unauthorized file downloads, compromising system integrity. Find out how to mitigate the risk and prevent exploitation.
Understanding CVE-2023-37551
This is a vulnerability identified in multiple CODESYS products that allows specially crafted network communication requests to download files with any file extensions to the controller, compromising the integrity of the CODESYS control runtime system.
What is CVE-2023-37551?
In multiple versions of CODESYS products, attackers can exploit the CmpApp component after successful user authentication to download files with any file extension to the controller, bypassing file type filtering normally done by the regular file download method (CmpFileTransfer).
The Impact of CVE-2023-37551
The integrity of the CODESYS control runtime system can be compromised by the files loaded onto the controller through this vulnerability.
Technical Details of CVE-2023-37551
Vulnerability Description
After successful authentication, specially crafted network communication requests can be used in multiple CODESYS products to download files with any file extension to the controller.
Affected Systems and Versions
Exploitation Mechanism
Attackers can utilize the CmpApp component to download files with any file extensions to the controller, compromising the integrity of the CODESYS control runtime system.
Mitigation and Prevention
Immediate Steps to Take
Users of affected systems should update to versions higher than V4.10.0.0 for CODESYS Control products and higher than V3.5.19.20 for CODESYS Control RTE and related products.
Long-Term Security Practices
Regularly update CODESYS products and maintain stringent network access control measures to prevent unauthorized access.
Patching and Updates
Monitor official CODESYS channels for security patches and updates to address vulnerabilities like CVE-2023-37551.