CODESYS²úÆ·¶à¸öÎó²îÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2019-09-18¡ñÎó²î±àºÅºÍ¼¶±ð
CVE±àºÅ£ºCVE-2019-13558£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬CVSS·ÖÖµ£º9.8
CVE±àºÅ£ºCVE-2019-13552£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬CVSS·ÖÖµ£º8.8
CVE±àºÅ£ºCVE-2019-13556£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬CVSS·ÖÖµ£º8.8
CVE±àºÅ£ºCVE-2019-13550£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬CVSS·ÖÖµ£º9.8
CVE±àºÅ£ºÔÝÎÞ£¬£¬£¬Î£ÏÕ¼¶±ð£ºÑÏÖØ£¬£¬£¬CVSS·ÖÖµ£º10
CVE±àºÅ£ºCVE-2019-9013£¬£¬£¬Î£ÏÕ¼¶±ð£º¸ßΣ£¬£¬£¬CVSS·ÖÖµ£º8.8
¡ñÓ°Ïì°æ±¾
ÊÜÓ°ÏìµÄ°æ±¾
CVE-2019-13558¡¢CVE-2019-13552¡¢CVE-2019-13556¡¢CVE-2019-13550
WebAccess Versions 8.4.1 and prior
CVEÔÝÎÞ
All CODESYS V2.3 ENI servers prior version V3.2.2.24
CVE-2019-9013
CODESYS V3 products
¡ñÎó²î¸ÅÊö
×î½üÔڵ¹ú3S-Smart Software SolutionsÖÆÔìµÄÆÕ±éʹÓõÄCODESYS¹¤Òµ²úÆ·Öз¢Ã÷Á˼¸¸öÒªº¦ÇÒ¸ßÑÏÖØÐÔµÄÎó²î¡£¡£¡£¡£
CVE-2019-13558
ͨ¹ýÍøÂçÖ´ÐеÄÎó²î¿ÉÄܵ¼Ö¶ԴúÂëÌìÉúµÄ²»×¼È·¿ØÖÆ£¬£¬£¬Õâ¿ÉÄÜÔÊÐíÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬Êý¾Ý×ß©»òµ¼ÖÂϵͳÍ߽⡣¡£¡£¡£
CVE-2019-13552
¶à¸öÏÂÁî×¢ÈëÎó²îÊÇÓÉȱ·¦¶ÔÓû§ÌṩµÄÊý¾ÝµÄ׼ȷÑéÖ¤ÒýÆðµÄ£¬£¬£¬²¢ÇÒ¿ÉÄÜÔÊÐíí§ÒâÎļþɾ³ýºÍÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£
CVE-2019-13556
ÓÉÓÚȱ·¦¶ÔÓû§ÌṩµÄÊý¾Ý³¤¶ÈµÄÊʵ±ÑéÖ¤£¬£¬£¬µ¼Ö¶à¸ö»ùÓÚ¿ÍÕ»µÄ»º³åÇøÒç³öÎó²î¡£¡£¡£¡£Ê¹ÓÃÕâЩÎó²î¿ÉÄÜÔÊÐíÔ¶³ÌÖ´ÐдúÂë¡£¡£¡£¡£
CVE-2019-13550
²»Õýµ±µÄÊÚȨÎó²î¿ÉÄÜÔÊÐí¹¥»÷Õßй¶Ãô¸ÐÐÅÏ¢£¬£¬£¬µ¼Ö¶ԴúÂëÌìÉúµÄ²»×¼È·¿ØÖÆ£¬£¬£¬Õâ¿ÉÄÜÔÊÐíÔ¶³Ì´úÂëÖ´Ðлòµ¼ÖÂϵͳÍ߽⡣¡£¡£¡£
CODESYS ENIЧÀÍÆ÷»º³åÇøÒç³öÎó²î
CODESYS ENIЧÀÍÆ÷ÖлùÓÚ¿ÍÕ»µÄÒªº¦»º³åÇøÒç³ö£¬£¬£¬ËüÓÐÖúÓÚÖÎÀíCODESYSÏîÄ¿ÖеŤ¾ß¡£¡£¡£¡£¿£¿£¿£¿£¿ÉÒÔͨ¹ýÏòÄ¿µÄЧÀÍÆ÷·¢ËÍÌØÖÆÇëÇ󣬣¬£¬¹¥»÷Õß¿ÉÒÔÌᳫԶ³Ìí§Òâ´úÂëÖ´ÐлòDoS¹¥»÷¡£¡£¡£¡£
CVE-2019-9013
ÕâÖÖÈõµãÔÊÐíÔ¶³Ì¹¥»÷Õß½ÓÊÜ»ò¹Ø±ÕÏÖÓеÄͨѶÐŵÀ¡£¡£¡£¡£Í³Ò»×é¼þÖеÄÁíÒ»¸öÎÊÌâÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆÇëÇóÀ´µ¼ÖÂDoSÌõ¼þ¡£¡£¡£¡£
¡ñÎó²îÑéÖ¤
ÔÝÎÞPOC/EXP¡£¡£¡£¡£
¡ñÐÞ¸´½¨Òé
ÏÖÔÚ³§ÉÌÒÑÐû²¼Éý¼¶²¹¶¡ÒÔÐÞ¸´Îó²î£¬£¬£¬ÏÂÔØÁ´½Ó£º
https://support.advantech.com/support/DownloadSRDetail_New.aspx?SR_ID=1-MS9MJV&Doc_Source=Download
https://www.codesys.com/security/security-reports.html
¡ñ²Î¿¼Á´½Ó
https://www.securityweek.com/serious-flaws-codesys-products-expose-industrial-systems-remote-attacks