
Cloud Vulnerability DB
A community-led vulnerabilities database
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. The vulnerability (CVE-2022-31803) was disclosed on June 24, 2022. Existing connections are not affected and therefore remain intact (NVD, CISA).
The vulnerability is rated with a CVSS score of 5.0 (Medium severity) and affects CODESYS Gateway Server V2 prior to version V2.3.9.38. The issue stems from insufficient validation of TCP client connection activity, which can be exploited by an unauthenticated attacker to consume all available TCP connections (Hacker News).
The successful exploitation of this vulnerability allows an unauthenticated attacker to prevent legitimate users from establishing new connections to the CODESYS Gateway Server V2, effectively causing a denial-of-service condition for new connection attempts. However, existing connections remain unaffected by the attack (NVD).
CODESYS has released patches to address this vulnerability. Users should upgrade to CODESYS Gateway Server V2 version V2.3.9.38 or later. Additionally, it's recommended to locate affected products behind security protection devices and implement a defense-in-depth strategy for network security (Hacker News).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."