|Article No°||Product Name||Affected Version(s)|
|CODESYS Development System||184.108.40.206 < 220.127.116.11|
The Notification Center of the CODESYS Development System receives messages without ensuring that the message was not modified during transmission. This finally enables MITMs code execution when the user clicks the "Learn More" button.
In CODESYS Development System versions from 18.104.22.168 and before 22.214.171.124 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
Update the CODESYS Development System to version 126.96.36.199.
The CODESYS Development System can be downloaded and installed directly with the CODESYS Installer or be downloaded from the CODESYS Store.
Alternatively, you will find further information on obtaining the software update in the CODESYS Update area
This vulnerability was discovered by Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative.
Coordination done by CERT@VDE.