Files
CVEs-PoC/2021/CVE-2021-21864.md
2025-09-29 21:09:30 +02:00

18 lines
984 B
Markdown

### [CVE-2021-21864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21864)
![](https://img.shields.io/static/v1?label=Product&message=CODESYS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=CODESYS%20GmbH%20CODESYS%20Development%20System%203.5.16%2C%20CODESYS%20GmbH%20CODESYS%20Development%20System%203.5.17%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brightgreen)
### Description
A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1301
#### Github
No PoCs found on GitHub currently.