PatchSiren cyber security CVE debrief
CVE-2022-31802 CODESYS CVE debrief
CVE-2022-31802 is a critical authentication bypass affecting CODESYS Gateway Server V2 in Festo-related software. According to the supplied CSAF description, versions prior to V2.3.9.38 compare only part of the provided password against the real gateway password, which can let an attacker authenticate with a shorter password that matches the compared portion. The result is a network-reachable, unauthenticated path to login with high impact to confidentiality, integrity, and availability.
- Vendor
- CODESYS
- Product
- Software
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-12-03
- Original CVE updated
- 2024-12-03
- Advisory published
- 2024-12-03
- Advisory updated
- 2024-12-03
Who should care
OT/ICS operators, plant engineering teams, and administrators running CODESYS provided by Festo or CODESYS Gateway Server V2 should treat this as urgent. Security teams responsible for industrial gateways, remote access paths, and controller authentication should also verify exposure and patch status.
Technical summary
The supplied advisory describes a logic flaw in password verification: only part of the submitted password is checked against the stored gateway password. Because the CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, the issue is remotely reachable, requires no privileges or user interaction, and can lead to full compromise of the affected service. The source identifies affected versions as those prior to V2.3.9.38 and provides a mitigation to enable password protection at login when no controller password is set.
Defensive priority
Immediate
Recommended defensive actions
- Identify any deployment of CODESYS Gateway Server V2 or CODESYS provided by Festo in the environment.
- Upgrade affected installations to a version at or above V2.3.9.38.
- Enable password protection at login if no password is set at the controller.
- Manually include the password configuration file in backup and restore workflows, since the default FFT backup and restore mechanism does not cover it.
- Restrict network access to industrial gateway services and monitor for unusual authentication activity.
Evidence notes
The CSAF source item (ICSA-25-182-03) states that versions prior to V2.3.9.38 compare only part of the specified password to the real CODESYS Gateway password. The same source assigns CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and lists a mitigation about enabling password protection at login. The supplied revision history shows the advisory was initially published on 2024-12-03 and then corrected the same day to fix one reference.
Official resources
-
CVE-2022-31802 CVE record
CVE.org
-
CVE-2022-31802 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Use the supplied CVE and source timestamps for timing context: the record and source item are both dated 2024-12-03T11:00:00Z in the provided corpus, and the CSAF revision history notes a same-day corrected-reference update. No KEV entry is