ID

VAR-202105-0852


CVE

CVE-2021-30192


TITLE

CODESYS V2 Web-Server  Authentication Vulnerability in Microsoft

Trust: 0.8

sources: JVNDB: JVNDB-2021-007155

DESCRIPTION

CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check. CODESYS V2 Web-Server Contains an improper authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.16

sources: NVD: CVE-2021-30192 // JVNDB: JVNDB-2021-007155 // CNNVD: CNNVD-202104-975

AFFECTED PRODUCTS

vendor:wagomodel:750-8204scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-881scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-891scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8216scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-862scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8206scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8211scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8217scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8212scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-882scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-889scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-880scope:ltversion:fw16

Trust: 1.0

vendor:wagomodel:750-829scope:ltversion:fw15

Trust: 1.0

vendor:codesysmodel:v2 web serverscope:ltversion:1.1.9.20

Trust: 1.0

vendor:wagomodel:750-832scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-885scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-852scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-8214scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-823scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-893scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8202scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-831scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-8210scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8213scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8207scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-890scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8208scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8203scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:3s smartmodel:codesys v2 web serverscope:eqversion: -

Trust: 0.8

vendor:3s smartmodel:codesys v2 web serverscope:eqversion:1.1.9.20

Trust: 0.8

sources: JVNDB: JVNDB-2021-007155 // NVD: CVE-2021-30192

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30192
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-30192
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-1621
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-30192
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-30192
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-30192
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-007155 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1621 // NVD: CVE-2021-30192

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Bad authentication (CWE-863) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-007155 // NVD: CVE-2021-30192

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-1621

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1621

PATCH

title:Advisory 2021-07url:https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14726&token=553da5d11234bbe1ceed59969d419a71bb8c8747&download=

Trust: 0.8

sources: JVNDB: JVNDB-2021-007155

EXTERNAL IDS

db:NVDid:CVE-2021-30192

Trust: 3.2

db:ICS CERTid:ICSA-21-173-02

Trust: 1.4

db:JVNid:JVNVU97061687

Trust: 0.8

db:JVNDBid:JVNDB-2021-007155

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021062306

Trust: 0.6

db:AUSCERTid:ESB-2021.2215

Trust: 0.6

db:CNNVDid:CNNVD-202105-1621

Trust: 0.6

sources: JVNDB: JVNDB-2021-007155 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1621 // NVD: CVE-2021-30192

REFERENCES

url:https://customers.codesys.com/index.php

Trust: 1.6

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=14726&token=553da5d11234bbe1ceed59969d419a71bb8c8747&download=

Trust: 1.6

url:https://jvn.jp/vu/jvnvu97061687/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-30192

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-173-02

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021062306

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2215

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-173-02

Trust: 0.6

sources: JVNDB: JVNDB-2021-007155 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-1621 // NVD: CVE-2021-30192

CREDITS

Vyacheslav Moskvin, Sergey Fedonin, and Anton Dorfman of Positive Technologies reported these vulnerabilities to CODESYS.

Trust: 0.6

sources: CNNVD: CNNVD-202105-1621

SOURCES

db:JVNDBid:JVNDB-2021-007155
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202105-1621
db:NVDid:CVE-2021-30192

LAST UPDATE DATE

2025-08-16T22:21:47.324000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-007155date:2022-02-03T07:38:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202105-1621date:2022-07-14T00:00:00
db:NVDid:CVE-2021-30192date:2025-08-15T20:27:29.643

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-007155date:2022-02-03T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202105-1621date:2021-05-25T00:00:00
db:NVDid:CVE-2021-30192date:2021-05-25T13:15:17.837