ID

VAR-202206-2040


CVE

CVE-2022-31803


TITLE

CODESYS GmbH  of  CODESYS Gateway  Resource exhaustion vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-011709

DESCRIPTION

In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact. CODESYS GmbH of CODESYS Gateway Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state

Trust: 1.8

sources: NVD: CVE-2022-31803 // JVNDB: JVNDB-2022-011709 // VULHUB: VHN-423672 // VULMON: CVE-2022-31803

AFFECTED PRODUCTS

vendor:codesysmodel:gatewayscope:gteversion:2.0

Trust: 1.0

vendor:codesysmodel:gatewayscope:ltversion:2.3.9.38

Trust: 1.0

vendor:codesysmodel:gatewayscope:eqversion:2.0 that's all 2.3.9.38

Trust: 0.8

vendor:codesysmodel:gatewayscope: - version: -

Trust: 0.8

vendor:codesysmodel:gatewayscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011709 // NVD: CVE-2022-31803

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-31803
value: MEDIUM

Trust: 1.0

info@cert.vde.com: CVE-2022-31803
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-31803
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202206-2455
value: MEDIUM

Trust: 0.6

VULHUB: VHN-423672
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-31803
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-31803
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-423672
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

info@cert.vde.com: CVE-2022-31803
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

OTHER: JVNDB-2022-011709
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // JVNDB: JVNDB-2022-011709 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803 // NVD: CVE-2022-31803

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:Resource exhaustion (CWE-400) [ others ]

Trust: 0.8

sources: VULHUB: VHN-423672 // JVNDB: JVNDB-2022-011709 // NVD: CVE-2022-31803

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

PATCH

title:CODESYS Gateway Server Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=197311

Trust: 0.6

sources: CNNVD: CNNVD-202206-2455

EXTERNAL IDS

db:NVDid:CVE-2022-31803

Trust: 3.4

db:ICS CERTid:ICSA-25-182-03

Trust: 0.8

db:JVNid:JVNVU97192309

Trust: 0.8

db:JVNDBid:JVNDB-2022-011709

Trust: 0.8

db:CNNVDid:CNNVD-202206-2455

Trust: 0.6

db:VULHUBid:VHN-423672

Trust: 0.1

db:VULMONid:CVE-2022-31803

Trust: 0.1

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // JVNDB: JVNDB-2022-011709 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803

REFERENCES

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download=

Trust: 2.5

url:https://jvn.jp/vu/jvnvu97192309/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-31803

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-182-03

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-31803/

Trust: 0.6

url:https://customers.codesys.com/index.php?eid=dumpfile&t=f&f=17141&token=17867e35cfd30c77ba0137f9a17b3a557a4b7b66&download=

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-423672 // VULMON: CVE-2022-31803 // JVNDB: JVNDB-2022-011709 // CNNVD: CNNVD-202206-2455 // NVD: CVE-2022-31803

SOURCES

db:VULHUBid:VHN-423672
db:VULMONid:CVE-2022-31803
db:JVNDBid:JVNDB-2022-011709
db:CNNVDid:CNNVD-202206-2455
db:NVDid:CVE-2022-31803

LAST UPDATE DATE

2025-07-04T22:38:02.113000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-423672date:2022-07-01T00:00:00
db:VULMONid:CVE-2022-31803date:2022-07-01T00:00:00
db:JVNDBid:JVNDB-2022-011709date:2025-07-03T05:54:00
db:CNNVDid:CNNVD-202206-2455date:2022-07-04T00:00:00
db:NVDid:CVE-2022-31803date:2022-07-01T13:34:36.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-423672date:2022-06-24T00:00:00
db:VULMONid:CVE-2022-31803date:2022-06-24T00:00:00
db:JVNDBid:JVNDB-2022-011709date:2023-08-23T00:00:00
db:CNNVDid:CNNVD-202206-2455date:2022-06-24T00:00:00
db:NVDid:CVE-2022-31803date:2022-06-24T08:15:07.463