ID

VAR-202105-0853


CVE

CVE-2021-30193


TITLE

CODESYS V2 Web-Server  Out-of-bounds Vulnerability in Microsoft

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130

DESCRIPTION

CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write. CODESYS V2 Web-Server Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2021-30193 // JVNDB: JVNDB-2021-007130

AFFECTED PRODUCTS

vendor:wagomodel:750-8204scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-881scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-891scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8216scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-862scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8206scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8211scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8217scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8212scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-882scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-889scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-880scope:ltversion:fw16

Trust: 1.0

vendor:wagomodel:750-829scope:ltversion:fw15

Trust: 1.0

vendor:codesysmodel:v2 web serverscope:ltversion:1.1.9.20

Trust: 1.0

vendor:wagomodel:750-832scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-885scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-852scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-8214scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-823scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-893scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8202scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-831scope:ltversion:fw15

Trust: 1.0

vendor:wagomodel:750-8210scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8213scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8207scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-890scope:ltversion:fw08

Trust: 1.0

vendor:wagomodel:750-8208scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:wagomodel:750-8203scope:ltversion:03.06.19_\(18\)

Trust: 1.0

vendor:3s smartmodel:codesys v2 web serverscope:eqversion: -

Trust: 0.8

vendor:3s smartmodel:codesys v2 web serverscope:eqversion:1.1.9.20

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130 // NVD: CVE-2021-30193

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30193
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-30193
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202105-1623
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2021-30193
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2021-30193
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-30193
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130 // CNNVD: CNNVD-202105-1623 // NVD: CVE-2021-30193

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130 // NVD: CVE-2021-30193

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202105-1623

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202105-1623

PATCH

title:Advisory 2021-07url:https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=14726&token=553da5d11234bbe1ceed59969d419a71bb8c8747&download=

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130

EXTERNAL IDS

db:NVDid:CVE-2021-30193

Trust: 3.2

db:JVNid:JVNVU97061687

Trust: 0.8

db:ICS CERTid:ICSA-21-173-02

Trust: 0.8

db:JVNDBid:JVNDB-2021-007130

Trust: 0.8

db:CNNVDid:CNNVD-202105-1623

Trust: 0.6

sources: JVNDB: JVNDB-2021-007130 // CNNVD: CNNVD-202105-1623 // NVD: CVE-2021-30193

REFERENCES

url:https://customers.codesys.com/index.php

Trust: 1.6

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=14726&token=553da5d11234bbe1ceed59969d419a71bb8c8747&download=

Trust: 1.6

url:https://jvn.jp/vu/jvnvu97061687/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-30193

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-21-173-02

Trust: 0.8

sources: JVNDB: JVNDB-2021-007130 // CNNVD: CNNVD-202105-1623 // NVD: CVE-2021-30193

SOURCES

db:JVNDBid:JVNDB-2021-007130
db:CNNVDid:CNNVD-202105-1623
db:NVDid:CVE-2021-30193

LAST UPDATE DATE

2025-08-16T21:34:04.507000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-007130date:2022-02-03T06:41:00
db:CNNVDid:CNNVD-202105-1623date:2021-05-27T00:00:00
db:NVDid:CVE-2021-30193date:2025-08-15T20:27:21.247

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-007130date:2022-02-03T00:00:00
db:CNNVDid:CNNVD-202105-1623date:2021-05-25T00:00:00
db:NVDid:CVE-2021-30193date:2021-05-25T13:15:17.880