Vulnerability Details CVE-2023-3663
In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.5%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2023-3663
-
cpe:2.3:a:codesys:development_system:3.5.11.20
-
cpe:2.3:a:codesys:development_system:3.5.11.30
-
cpe:2.3:a:codesys:development_system:3.5.11.40
-
cpe:2.3:a:codesys:development_system:3.5.11.50
-
cpe:2.3:a:codesys:development_system:3.5.11.60
-
cpe:2.3:a:codesys:development_system:3.5.12.0
-
cpe:2.3:a:codesys:development_system:3.5.12.10
-
cpe:2.3:a:codesys:development_system:3.5.12.20
-
cpe:2.3:a:codesys:development_system:3.5.12.30
-
cpe:2.3:a:codesys:development_system:3.5.12.40
-
cpe:2.3:a:codesys:development_system:3.5.12.50
-
cpe:2.3:a:codesys:development_system:3.5.12.60
-
cpe:2.3:a:codesys:development_system:3.5.12.70
-
cpe:2.3:a:codesys:development_system:3.5.13.0
-
cpe:2.3:a:codesys:development_system:3.5.13.10
-
cpe:2.3:a:codesys:development_system:3.5.13.20
-
cpe:2.3:a:codesys:development_system:3.5.13.30
-
cpe:2.3:a:codesys:development_system:3.5.13.40
-
cpe:2.3:a:codesys:development_system:3.5.14.0
-
cpe:2.3:a:codesys:development_system:3.5.14.10
-
cpe:2.3:a:codesys:development_system:3.5.14.20
-
cpe:2.3:a:codesys:development_system:3.5.14.30
-
cpe:2.3:a:codesys:development_system:3.5.14.40
-
cpe:2.3:a:codesys:development_system:3.5.15.0
-
cpe:2.3:a:codesys:development_system:3.5.15.10
-
cpe:2.3:a:codesys:development_system:3.5.15.20
-
cpe:2.3:a:codesys:development_system:3.5.15.30
-
cpe:2.3:a:codesys:development_system:3.5.15.40
-
cpe:2.3:a:codesys:development_system:3.5.15.50
-
cpe:2.3:a:codesys:development_system:3.5.16.0
-
cpe:2.3:a:codesys:development_system:3.5.16.10
-
cpe:2.3:a:codesys:development_system:3.5.16.20
-
cpe:2.3:a:codesys:development_system:3.5.16.30
-
cpe:2.3:a:codesys:development_system:3.5.16.40
-
cpe:2.3:a:codesys:development_system:3.5.16.50
-
cpe:2.3:a:codesys:development_system:3.5.16.60
-
cpe:2.3:a:codesys:development_system:3.5.16.70
-
cpe:2.3:a:codesys:development_system:3.5.16.90
-
cpe:2.3:a:codesys:development_system:3.5.17.0
-
cpe:2.3:a:codesys:development_system:3.5.17.10
-
cpe:2.3:a:codesys:development_system:3.5.17.20
-
cpe:2.3:a:codesys:development_system:3.5.17.30
-
cpe:2.3:a:codesys:development_system:3.5.17.40
-
cpe:2.3:a:codesys:development_system:3.5.17.60
-
cpe:2.3:a:codesys:development_system:3.5.18.0
-
cpe:2.3:a:codesys:development_system:3.5.18.20
-
cpe:2.3:a:codesys:development_system:3.5.18.30
-
cpe:2.3:a:codesys:development_system:3.5.18.40
-
cpe:2.3:a:codesys:development_system:3.5.18.50
-
cpe:2.3:a:codesys:development_system:3.5.19.0
-
cpe:2.3:a:codesys:development_system:3.5.19.10