{"id":2627,"date":"2023-10-24T10:00:24","date_gmt":"2023-10-24T13:00:24","guid":{"rendered":"http:\/\/newsite.altusautomation.com\/?page_id=2627"},"modified":"2026-04-28T09:27:40","modified_gmt":"2026-04-28T12:27:40","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/altusautomation.com\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2627\" class=\"elementor elementor-2627\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1edda e-flex e-con-boxed e-con e-parent\" data-id=\"1f1edda\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4c1123 e-con-full e-flex e-con e-child\" data-id=\"e4c1123\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac4aedc elementor-icon-list--layout-inline elementor-align-start elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ac4aedc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Solutions<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cybersecurity<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74b55ae elementor-widget elementor-widget-heading\" data-id=\"74b55ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity:<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f704ab2 elementor-widget elementor-widget-heading\" data-id=\"f704ab2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your business protected against attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2da1a6 elementor-widget elementor-widget-text-editor\" data-id=\"a2da1a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With advances in communication technologies, machines and systems are becoming increasingly interconnected through the internet. In this context, protection against cyberattacks becomes essential to ensure the security, data integrity, and continuity of industrial operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f96e0c5 e-con-full e-flex e-con e-child\" data-id=\"f96e0c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3ec27ec e-con-full e-flex e-con e-child\" data-id=\"3ec27ec\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b017aa elementor-widget elementor-widget-shortcode\" data-id=\"2b017aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"3011\" class=\"elementor elementor-3011\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-e5a5209 e-flex e-con-boxed e-con e-parent\" data-id=\"e5a5209\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55e3312 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"55e3312\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;60&quot;,&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"Cybersecurity\" name=\"Solicite uma Assessoria\" aria-label=\"Solicite uma Assessoria\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"3011\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"55e3312\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-nome elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-nome\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[nome]\" id=\"form-field-nome\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tE-mail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"E-mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-mensagem elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-mensagem\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[mensagem]\" id=\"form-field-mensagem\" rows=\"4\" placeholder=\"Message (optional)\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_44d8206 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_44d8206]\" id=\"form-field-field_44d8206\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_44d8206\">I hereby confirm that I agree with Altus\u2019 privacy policy<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-hidden elementor-field-group elementor-column elementor-field-group-URL elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"hidden\" name=\"form_fields[URL]\" id=\"form-field-URL\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-60 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Send message<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76cc2c0 elementor-widget elementor-widget-heading\" data-id=\"76cc2c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Request an assessment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edd7e1a elementor-widget elementor-widget-text-editor\" data-id=\"edd7e1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Do you want to implement your current project with us? We will be happy to advise you!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd215f9 e-flex e-con-boxed e-con e-parent\" data-id=\"cd215f9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-022623d e-con-full e-flex e-con e-child\" data-id=\"022623d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a398de elementor-widget elementor-widget-heading\" data-id=\"3a398de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prevention, identification, and resolution of vulnerabilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f772e99 elementor-widget elementor-widget-text-editor\" data-id=\"f772e99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The security features embedded in Altus products are constantly reviewed and updated to prevent potential vulnerabilities. However, for cases where a vulnerability is identified by external agents, we are committed to resolving these issues within a reasonable timeframe.<\/p><p>In our <b data-path-to-node=\"1\" data-index-in-node=\"7\">Cybersecurity Manual<\/b>, we offer important information regarding security with Altus products.<\/p><p><a style=\"color: white;\" href=\"https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/10\/CybersecurityPolicy-Manual-2026.pdf\"><b>Click here to download the manual<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c55296 e-con-full e-flex e-con e-child\" data-id=\"7c55296\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b47b0c7 elementor-widget elementor-widget-image\" data-id=\"b47b0c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/06\/Cyber2.png\" class=\"attachment-full size-full wp-image-15831\" alt=\"\" srcset=\"https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/06\/Cyber2.png 1536w, https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/06\/Cyber2-300x200.png 300w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d04cfcb e-flex e-con-boxed e-con e-parent\" data-id=\"d04cfcb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d634717 e-con-full e-flex e-con e-child\" data-id=\"d634717\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c7e2e1 elementor-widget elementor-widget-heading\" data-id=\"0c7e2e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">List of security advisories published by Altus<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4055053 elementor-widget elementor-widget-text-editor\" data-id=\"4055053\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">These advisories provide essential information about known vulnerabilities, including possible alternative solutions and available security updates. It is up to the technical assessment of the users of our products to determine if and when to implement the recommended updates.<\/p><p data-path-to-node=\"1\">If you detect a possible vulnerability that has a direct or indirect effect on an Altus product, please inform us via the email <b data-path-to-node=\"1\" data-index-in-node=\"128\">ouvidoria@altusautomation.com<\/b>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb9ef34 e-con-full e-flex e-con e-child\" data-id=\"eb9ef34\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4edb5dc elementor-widget elementor-widget-image\" data-id=\"4edb5dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"516\" src=\"https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-1024x661.jpg\" class=\"attachment-large size-large wp-image-14520\" alt=\"\" srcset=\"https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-1024x661.jpg 1024w, https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-300x194.jpg 300w, https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-768x496.jpg 768w, https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-18x12.jpg 18w, https:\/\/altusautomation.com\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados.jpg 1101w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e8a3c3 e-flex e-con-boxed e-con e-parent\" data-id=\"3e8a3c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93dc680 elementor-widget elementor-widget-heading\" data-id=\"93dc680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Help us keep Altus products as secure as possible<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd7c2d5 elementor-widget elementor-widget-heading\" data-id=\"fd7c2d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The vulnerabilities in the following list apply to Altus CPU models: XP300, XP315, X325, XP340, XP350, XP351, NX3010, NX3020, NX3030, NX3003, NX3004, NX3005, NX3008, NX3035, HX3040.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-295965d e-flex e-con-boxed e-con e-parent\" data-id=\"295965d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5f04e5e e-grid e-con-full e-con e-child\" data-id=\"5f04e5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-68690e8 e-con-full e-flex e-con e-child\" data-id=\"68690e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e993a45 e-flex e-con-boxed e-con e-child\" data-id=\"e993a45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-902a2ea elementor-widget elementor-widget-heading\" data-id=\"902a2ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30792<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef83366 e-con-full e-flex e-con e-child\" data-id=\"ef83366\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5ff4e elementor-widget elementor-widget-text-editor\" data-id=\"8b5ff4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4, NX30x0: 1.14.7.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS V3&#8217;s CmpChannelServer, across several versions, uncontrolled resource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad54e16 e-con-full e-flex e-con e-child\" data-id=\"ad54e16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9506dd elementor-widget elementor-widget-button\" data-id=\"c9506dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30792\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35ca770 e-con-full e-flex e-con e-child\" data-id=\"35ca770\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3cc59ac e-flex e-con-boxed e-con e-child\" data-id=\"3cc59ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1860882 elementor-widget elementor-widget-heading\" data-id=\"1860882\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30791<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb0b859 e-con-full e-flex e-con e-child\" data-id=\"eb0b859\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce612c7 elementor-widget elementor-widget-text-editor\" data-id=\"ce612c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4, NX30x0: 1.14.7.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS V3&#8217;s CmpBlkDrvTcp, across several versions, uncontrolled resource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93d11b6 e-con-full e-flex e-con e-child\" data-id=\"93d11b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ec8f82 elementor-widget elementor-widget-button\" data-id=\"4ec8f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30791\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20cd61c elementor-widget elementor-widget-heading\" data-id=\"20cd61c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The vulnerabilities in the following list apply to Mastertool IEC XE - MT8500<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf8ba49 e-con-full e-flex e-con e-child\" data-id=\"cf8ba49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f874a5f e-flex e-con-boxed e-con e-child\" data-id=\"f874a5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d40785 elementor-widget elementor-widget-heading\" data-id=\"1d40785\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22515<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f3e6b9 e-con-full e-flex e-con e-child\" data-id=\"2f3e6b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a559cb elementor-widget elementor-widget-text-editor\" data-id=\"6a559cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.12.32.4, XP (except 351 and 350): 1.12.5.3, 300x (except 3008): 1.12.5.3, 30&#215;0: up to 1.10.8.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> A remote and authenticated attacker could use the CODESYS Control runtime system control program to exploit the vulnerability in order to read and modify the configuration file(s) of the affected products.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5def563 e-con-full e-flex e-con e-child\" data-id=\"5def563\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6746fca elementor-widget elementor-widget-button\" data-id=\"6746fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22515\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e1cfb0 e-con-full e-flex e-con e-child\" data-id=\"6e1cfb0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff56d03 e-flex e-con-boxed e-con e-child\" data-id=\"ff56d03\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d18bb1 elementor-widget elementor-widget-heading\" data-id=\"1d18bb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22508<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0d4fe0 e-con-full e-flex e-con e-child\" data-id=\"e0d4fe0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4aa685 elementor-widget elementor-widget-text-editor\" data-id=\"d4aa685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4, NX30x0: 1.14.7.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An Improper Input Validation vulnerability in multiple CODESYS V3 products allows a remote and authenticated attacker to block consecutive logins of a specific type.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e354a1a e-con-full e-flex e-con e-child\" data-id=\"e354a1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-654a36a elementor-widget elementor-widget-button\" data-id=\"654a36a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22508\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1787ea e-con-full e-flex e-con e-child\" data-id=\"c1787ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1400044 e-flex e-con-boxed e-con e-child\" data-id=\"1400044\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b64f66c elementor-widget elementor-widget-heading\" data-id=\"b64f66c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9012<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d07e36e e-con-full e-flex e-con e-child\" data-id=\"d07e36e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a057158 elementor-widget elementor-widget-text-editor\" data-id=\"a057158\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.9.4.0, XP: 1.8.5.0, NX3003: 1.8.11.0, NX3004 and 5: up to 1.8.11.0, NX30x0: up to 1.8.3.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An issue was discovered in 3S-Smart CODESYS V3 products. A specially crafted communication request can cause uncontrolled memory allocations in the affected CODESYS products and result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0cd1f0 e-con-full e-flex e-con e-child\" data-id=\"f0cd1f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fbaf7f elementor-widget elementor-widget-button\" data-id=\"3fbaf7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9012\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5e32ae e-con-full e-flex e-con e-child\" data-id=\"e5e32ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fd03568 e-flex e-con-boxed e-con e-child\" data-id=\"fd03568\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ea198 elementor-widget elementor-widget-heading\" data-id=\"d8ea198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9010<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df3c7bf e-con-full e-flex e-con e-child\" data-id=\"df3c7bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8db90b1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8db90b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.9.4.0, XP: 1.8.5.0, NX3003: 1.8.11.0, NX3004 and 5: up to 1.8.11.0, NX30x0: up to 1.8.3.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> <span class=\"citation-3 citation-end-3\">An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGatewa<\/span>y component are affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7638d44 e-con-full e-flex e-con e-child\" data-id=\"7638d44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a157f4 elementor-widget elementor-widget-button\" data-id=\"5a157f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9010\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-def7e42 e-con-full e-flex e-con e-child\" data-id=\"def7e42\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8504af2 e-flex e-con-boxed e-con e-child\" data-id=\"8504af2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5500bc1 elementor-widget elementor-widget-heading\" data-id=\"5500bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2018-25048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40a93f2 e-con-full e-flex e-con e-child\" data-id=\"40a93f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73cb8ec elementor-widget elementor-widget-text-editor\" data-id=\"73cb8ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">HX: 1.7.40.0, NX3004 and 5: up to 1.7.17.0, NX30x0: up to 1.7.0.8.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> The CODESYS runtime system in several versions allows a remote attacker with low privileges to use a path traversal vulnerability to access and modify all system files, as well as cause a denial-of-service (DoS) attack on the device.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-651e4aa e-con-full e-flex e-con e-child\" data-id=\"651e4aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa45a77 elementor-widget elementor-widget-button\" data-id=\"aa45a77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2018-25048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-006c858 e-con-full e-flex e-con e-child\" data-id=\"006c858\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18ac3a2 e-flex e-con-boxed e-con e-child\" data-id=\"18ac3a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-280f866 elementor-widget elementor-widget-heading\" data-id=\"280f866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-13542<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67e140e e-con-full e-flex e-con e-child\" data-id=\"67e140e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42152f4 elementor-widget elementor-widget-text-editor\" data-id=\"42152f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Firmware version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">XTORM: 1.7.58.0 and 1.7.40.0, XP (except 350, 351, and 340): 1.7.49.0, NX3003: 1.8.11.0, NX30x0: 1.8.3.0.<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In the CODESYS Development System, multiple components across several versions transmit passwords for communication between clients and servers in an unprotected manner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c67cebc e-con-full e-flex e-con e-child\" data-id=\"c67cebc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d28f38a elementor-widget elementor-widget-button\" data-id=\"d28f38a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-13542\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cbc36e e-con-full e-flex e-con e-child\" data-id=\"4cbc36e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-39c88b5 e-con-full e-flex e-con e-child\" data-id=\"39c88b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5035e36 e-flex e-con-boxed e-con e-child\" data-id=\"5035e36\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c32a7b5 elementor-widget elementor-widget-heading\" data-id=\"c32a7b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-4048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5208258 e-con-full e-flex e-con e-child\" data-id=\"5208258\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63c6d5e elementor-widget elementor-widget-text-editor\" data-id=\"63c6d5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.60<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> The &#8220;Inadequate Encryption Strength&#8221; security weakness in the CODESYS V3 Development System in versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate the code of encrypted boot applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5ec238 e-con-full e-flex e-con e-child\" data-id=\"f5ec238\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eabee0f elementor-widget elementor-widget-button\" data-id=\"eabee0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-4048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-613cc40 e-con-full e-flex e-con e-child\" data-id=\"613cc40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3428571 e-con-full e-flex e-con e-child\" data-id=\"3428571\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-304ce2c e-flex e-con-boxed e-con e-child\" data-id=\"304ce2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8813bb elementor-widget elementor-widget-heading\" data-id=\"d8813bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-31805<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35d615b e-con-full e-flex e-con e-child\" data-id=\"35d615b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23fac79 elementor-widget elementor-widget-text-editor\" data-id=\"23fac79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.60<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In the CODESYS Development System, several components across multiple versions transmit passwords for communication between clients and servers without protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c28681 e-con-full e-flex e-con e-child\" data-id=\"1c28681\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67d84ab elementor-widget elementor-widget-button\" data-id=\"67d84ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-31805\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cc61e0 e-con-full e-flex e-con e-child\" data-id=\"0cc61e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7d9853b e-con-full e-flex e-con e-child\" data-id=\"7d9853b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c43c616 e-flex e-con-boxed e-con e-child\" data-id=\"c43c616\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33fd411 elementor-widget elementor-widget-heading\" data-id=\"33fd411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30792<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce8d2c7 e-con-full e-flex e-con e-child\" data-id=\"ce8d2c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eedd5c elementor-widget elementor-widget-text-editor\" data-id=\"1eedd5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.60<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS V3&#8217;s CmpChannelServer, across several versions, uncontrolled resource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2227a6 e-con-full e-flex e-con e-child\" data-id=\"e2227a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9188c4 elementor-widget elementor-widget-button\" data-id=\"d9188c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30792\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff29e3b e-con-full e-flex e-con e-child\" data-id=\"ff29e3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-573405c e-con-full e-flex e-con e-child\" data-id=\"573405c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b016463 e-flex e-con-boxed e-con e-child\" data-id=\"b016463\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08deb5d elementor-widget elementor-widget-heading\" data-id=\"08deb5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30791<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5912a9 e-con-full e-flex e-con e-child\" data-id=\"f5912a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00c073f elementor-widget elementor-widget-text-editor\" data-id=\"00c073f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.60<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS V3&#8217;s CmpBlkDrvTcp, across several versions, uncontrolled resource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9422c8c e-con-full e-flex e-con e-child\" data-id=\"9422c8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8883ca3 elementor-widget elementor-widget-button\" data-id=\"8883ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30791\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-389957c e-con-full e-flex e-con e-child\" data-id=\"389957c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-997021e e-con-full e-flex e-con e-child\" data-id=\"997021e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7914c5b e-flex e-con-boxed e-con e-child\" data-id=\"7914c5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-061af7c elementor-widget elementor-widget-heading\" data-id=\"061af7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22515<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3dbad1 e-con-full e-flex e-con e-child\" data-id=\"f3dbad1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afe814b elementor-widget elementor-widget-text-editor\" data-id=\"afe814b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> A remote and authenticated attacker could use the CODESYS Control runtime system control program to exploit the vulnerability and read or modify the configuration file(s) of the affected products.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e2926a e-con-full e-flex e-con e-child\" data-id=\"0e2926a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae43f7 elementor-widget elementor-widget-button\" data-id=\"1ae43f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22515\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e8f5a9 e-con-full e-flex e-con e-child\" data-id=\"9e8f5a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8cbf109 e-con-full e-flex e-con e-child\" data-id=\"8cbf109\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-75078cc e-flex e-con-boxed e-con e-child\" data-id=\"75078cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-074479f elementor-widget elementor-widget-heading\" data-id=\"074479f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29240<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d99ad15 e-con-full e-flex e-con e-child\" data-id=\"d99ad15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd4652 elementor-widget elementor-widget-text-editor\" data-id=\"4dd4652\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> The CODESYS Development System 3 Package Manager in versions prior to 3.5.17.0 does not verify the validity of packages before installation, which could be used to install CODESYS packages with malicious content.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99f5dc1 e-con-full e-flex e-con e-child\" data-id=\"99f5dc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab532af elementor-widget elementor-widget-button\" data-id=\"ab532af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29240\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dfc5304 e-con-full e-flex e-con e-child\" data-id=\"dfc5304\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0a72105 e-flex e-con-boxed e-con e-child\" data-id=\"0a72105\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5fcd66 elementor-widget elementor-widget-heading\" data-id=\"e5fcd66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29239<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40a6895 e-con-full e-flex e-con e-child\" data-id=\"40a6895\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9338d86 elementor-widget elementor-widget-text-editor\" data-id=\"9338d86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> CODESYS Development System 3, in versions prior to 3.5.17.0, displays or executes malicious documents or files embedded in libraries without prior verification of their validity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9c678f e-con-full e-flex e-con e-child\" data-id=\"a9c678f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-193f944 elementor-widget elementor-widget-button\" data-id=\"193f944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29239\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99fa7de e-con-full e-flex e-con e-child\" data-id=\"99fa7de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0475384 e-flex e-con-boxed e-con e-child\" data-id=\"0475384\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a70c7e elementor-widget elementor-widget-heading\" data-id=\"6a70c7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-12068<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76496c3 e-con-full e-flex e-con e-child\" data-id=\"76496c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6abd7d elementor-widget elementor-widget-text-editor\" data-id=\"f6abd7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An issue was discovered in the CODESYS Development System in versions prior to 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-463c3d8 e-con-full e-flex e-con e-child\" data-id=\"463c3d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-272dc12 elementor-widget elementor-widget-button\" data-id=\"272dc12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-12068\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ced34bd e-con-full e-flex e-con e-child\" data-id=\"ced34bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9740161 e-flex e-con-boxed e-con e-child\" data-id=\"9740161\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a6d07a elementor-widget elementor-widget-heading\" data-id=\"8a6d07a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9012<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a546597 e-con-full e-flex e-con e-child\" data-id=\"a546597\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09dfe84 elementor-widget elementor-widget-text-editor\" data-id=\"09dfe84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.30<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An issue was discovered in 3S-Smart CODESYS V3 products. A specially crafted communication request can cause uncontrolled memory allocations in the affected CODESYS products, which may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49e6a1c e-con-full e-flex e-con e-child\" data-id=\"49e6a1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c96385 elementor-widget elementor-widget-button\" data-id=\"6c96385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9012\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1006f5e e-con-full e-flex e-con e-child\" data-id=\"1006f5e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-11d6235 e-flex e-con-boxed e-con e-child\" data-id=\"11d6235\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cb96b3 elementor-widget elementor-widget-heading\" data-id=\"9cb96b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9010<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55044fb e-con-full e-flex e-con e-child\" data-id=\"55044fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a2425e elementor-widget elementor-widget-text-editor\" data-id=\"3a2425e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.30<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> <span class=\"citation-8 citation-9 citation-10 citation-end-10\">An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior <\/span><span class=\"citation-8 citation-9 citation-end-9\">to v3.5.14.<\/span><span class=\"citation-8 citation-end-8\">20 that contain the CmpGatewa<\/span>y component are affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e2ecfc e-con-full e-flex e-con e-child\" data-id=\"8e2ecfc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e09a9ea elementor-widget elementor-widget-button\" data-id=\"e09a9ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9010\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a087ae2 e-con-full e-flex e-con e-child\" data-id=\"a087ae2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff6af91 e-flex e-con-boxed e-con e-child\" data-id=\"ff6af91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab973a elementor-widget elementor-widget-heading\" data-id=\"8ab973a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-36764<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af036fb e-con-full e-flex e-con e-child\" data-id=\"af036fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dca5cdf elementor-widget elementor-widget-text-editor\" data-id=\"dca5cdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS Gateway V3 in versions prior to 3.5.17.10, there is a <b data-path-to-node=\"1\" data-index-in-node=\"82\">NULL Pointer Dereference<\/b>. Specially crafted communication requests can cause a null pointer dereference in the affected CODESYS products, which may result in a denial-of-service (DoS) condition.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a41563 e-con-full e-flex e-con e-child\" data-id=\"6a41563\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4b9cea elementor-widget elementor-widget-button\" data-id=\"e4b9cea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-36764\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3047d15 e-con-full e-flex e-con e-child\" data-id=\"3047d15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7c44a4c e-flex e-con-boxed e-con e-child\" data-id=\"7c44a4c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-622a7c5 elementor-widget elementor-widget-heading\" data-id=\"622a7c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29241<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4abd90a e-con-full e-flex e-con e-child\" data-id=\"4abd90a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-829fc95 elementor-widget elementor-widget-text-editor\" data-id=\"829fc95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> In CODESYS Gateway 3 in versions prior to 3.5.16.70, there is a <b data-path-to-node=\"1\" data-index-in-node=\"81\">NULL pointer dereference<\/b> that can result in a denial-of-service (DoS) condition.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20cd315 e-con-full e-flex e-con e-child\" data-id=\"20cd315\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7cdfc elementor-widget elementor-widget-button\" data-id=\"4a7cdfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29241\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed981e2 e-con-full e-flex e-con e-child\" data-id=\"ed981e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ec14dc2 e-flex e-con-boxed e-con e-child\" data-id=\"ec14dc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-671b16c elementor-widget elementor-widget-heading\" data-id=\"671b16c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-7052<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d7ea62 e-con-full e-flex e-con e-child\" data-id=\"9d7ea62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b77d94 elementor-widget elementor-widget-text-editor\" data-id=\"5b77d94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.30<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> CODESYS Control V3, Gateway V3, and HMI V3, in versions prior to 3.5.15.30, allow for uncontrolled memory allocation that can result in a remote denial-of-service (DoS) condition.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c70459 e-con-full e-flex e-con e-child\" data-id=\"0c70459\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c87fe73 elementor-widget elementor-widget-button\" data-id=\"c87fe73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-7052\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1181eb8 e-con-full e-flex e-con e-child\" data-id=\"1181eb8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f29fb90 e-flex e-con-boxed e-con e-child\" data-id=\"f29fb90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a101a68 elementor-widget elementor-widget-heading\" data-id=\"a101a68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-5105<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-943e378 e-con-full e-flex e-con e-child\" data-id=\"943e378\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-beebea8 elementor-widget elementor-widget-text-editor\" data-id=\"beebea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An exploitable memory corruption vulnerability exists in the Name Service Client functionality of the 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large-scale <code data-path-to-node=\"1\" data-index-in-node=\"222\">memcpy<\/code>, resulting in an access violation and process termination. An attacker can send a packet to a device running <code data-path-to-node=\"1\" data-index-in-node=\"338\">GatewayService.exe<\/code> to trigger this vulnerability. All variants of CODESYS V3 products in all versions prior to V3.5.16.10 that contain the CmpRouter or CmpRouterEmbedded component are affected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd6ed72 e-con-full e-flex e-con e-child\" data-id=\"cd6ed72\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4008926 elementor-widget elementor-widget-button\" data-id=\"4008926\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-5105\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b4d6ce e-con-full e-flex e-con e-child\" data-id=\"5b4d6ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1c571ae e-flex e-con-boxed e-con e-child\" data-id=\"1c571ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a69813c elementor-widget elementor-widget-heading\" data-id=\"a69813c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-1989<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01064f7 e-con-full e-flex e-con e-child\" data-id=\"01064f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9ec53 elementor-widget elementor-widget-text-editor\" data-id=\"3e9ec53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.60<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> All versions of CODESYS Visualization prior to V4.2.0.0 generate a login dialog vulnerable to information exposure, allowing a remote and unauthenticated attacker to enumerate valid users.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf2e7de e-con-full e-flex e-con e-child\" data-id=\"cf2e7de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5c239 elementor-widget elementor-widget-button\" data-id=\"3c5c239\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-1989\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32da525 e-con-full e-flex e-con e-child\" data-id=\"32da525\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b23045d e-flex e-con-boxed e-con e-child\" data-id=\"b23045d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04c0df0 elementor-widget elementor-widget-heading\" data-id=\"04c0df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-12068<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-896e0a7 e-con-full e-flex e-con e-child\" data-id=\"896e0a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c11bd3f elementor-widget elementor-widget-text-editor\" data-id=\"c11bd3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.40<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> An issue was discovered in the CODESYS Development System in versions prior to 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89488e3 e-con-full e-flex e-con e-child\" data-id=\"89488e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61381e5 elementor-widget elementor-widget-button\" data-id=\"61381e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-12068\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3357ae7 e-con-full e-flex e-con e-child\" data-id=\"3357ae7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f518b4 e-flex e-con-boxed e-con e-child\" data-id=\"2f518b4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec991be elementor-widget elementor-widget-heading\" data-id=\"ec991be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2018-25048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72ec056 e-con-full e-flex e-con e-child\" data-id=\"72ec056\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4eb7c9 elementor-widget elementor-widget-text-editor\" data-id=\"d4eb7c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-path-to-node=\"0\">Software version with the vulnerability fixed: <b data-path-to-node=\"0\" data-index-in-node=\"47\">MTOOL 8500 3.30<\/b><\/p><p data-path-to-node=\"1\"><b data-path-to-node=\"1\" data-index-in-node=\"0\">CVE Description:<\/b> The CODESYS runtime system in several versions allows a remote attacker with low privileges to use a path traversal vulnerability to access and modify all system files, as well as cause a denial-of-service (DoS) attack on the device.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a420ec0 e-con-full e-flex e-con e-child\" data-id=\"a420ec0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-914e29c elementor-widget elementor-widget-button\" data-id=\"914e29c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2018-25048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">More details<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c79483 e-flex e-con-boxed e-con e-parent\" data-id=\"4c79483\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8c739 elementor-widget elementor-widget-heading\" data-id=\"9e8c739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">You should also check<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bbe0d7 e-con-full e-flex e-con e-parent\" data-id=\"6bbe0d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f05e7dc elementor-widget elementor-widget-shortcode\" data-id=\"f05e7dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"20288\" class=\"elementor elementor-20288\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-c529e71 e-con-full e-flex e-con e-parent\" data-id=\"c529e71\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a458a06 elementor-widget elementor-widget-ucaddon_slider_segments_content\" data-id=\"a458a06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_slider_segments_content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Slider Segmentos -->\n<style>\/* widget: Slider Segmentos *\/\n\n.bloco-servicos .swiper {\n  width: 100%;\n  height: 100%;\n}\n\n.bloco-servicos .swiper-slide {\n  text-align: center;\n  font-size: 18px;\n  display: flex;\n  justify-content: center;\n  align-items: flex-end;\n  background: rgba(000, 000, 000, 0.3);\n}\n\n.bloco-servicos .swiper-slide img {\n  display: block;\n  width: 100%;\n  height: 100%;\n  object-fit: cover;\n}\n\n.bloco-servicos {\n  height: 800px;\n  position: relative;\n  color: #fff;\n}\n\n.bloco-servicos h2 {\n  font-weight: 300;\n  position: absolute;\n  z-index: 9;\n  left: 40px;\n  top: 60px;\n  margin: 0;\n  font-size: 38px;\n}\n\n.bloco-servicos .swiper-figure {\n  height: 100%;\n  width: 100%;\n  position: absolute;\n}\n\n.bloco-servicos .swiper-slide-img {\n  background-size: cover !important;\n  background-position: center center !important;\n  z-index: -1;\n  transition: 0.3s;\n  opacity: 0;\n  height: 100%;\n  width: 100%;\n  position: absolute;\n  top: 0;\n  left: 0;\n}\n\n.bloco-servicos .swiper-slide-img.active {\n  z-index: 1;\n  opacity: 1;\n}\n\n.bloco-servicos .swiper-button-next {\n  right: 40px;\n}\n\n.bloco-servicos .swiper-button-prev {\n  left: 40px;\n}\n\n.bloco-servicos .swiper-button-next,\n.bloco-servicos .swiper-button-prev {\n  color: #fff;\n  width: 54px;\n  height: 54px;\n  top: 50%;\n}\n\n.bloco-servicos .swiper-button-next:after,\n.bloco-servicos .swiper-button-prev:after {\n  display: none;\n}\n\n.bloco-servicos .swiper-button-next svg,\n.bloco-servicos .swiper-button-prev svg {\n  width: 54px;\n  height: 54px;\n}\n\n.bloco-servicos .swiper-slide-content {\n  width: 100%;\n}\n\n.bloco-servicos .swiper-slide-content div {\n  padding: 40px 40px 70px;\n  text-align: left;\n  min-height: 100px;\n}\n\n.bloco-servicos .swiper-slide-content h3 {\n  font-weight: 400;\n  font-size: 38px;\n  line-height: 38px;\n  color: #fff;\n}\n\n.bloco-servicos .swiper-slide-content p {\n  font-weight: 400;\n  font-size: 16px;\n  line-height: 20px;\n  color: #fff;\n}\n\n.bloco-servicos .swiper-slide-content a {\n  display: flex;\n  align-items: center;\n  font-weight: 600;\n  font-size: 14px;\n  line-height: 15px;\n  color: #fff;\n  justify-content: space-between;\n}\n\n.bloco-servicos .swiper-pagination-clickable .swiper-pagination-bullet {\n  transition: 0.3s;\n}\n\n.bloco-servicos .progress-bar {\n  display: none;\n  align-items: center;\n  justify-content: space-between;\n  position: absolute;\n  left: 50%;\n  top: 5%;\n  z-index: 10;\n  margin-left: -65px;\n}\n\n.bloco-servicos .progress-bar .index,\n.bloco-servicos .progress-bar .length {\n  font-weight: 400;\n  font-size: 14px;\n  line-height: 15px;\n  color: #fff;\n}\n\n.bloco-servicos .progress-bar .bar {\n  width: 75px;\n  height: 1px;\n  background: #FFFFFF4D;\n  margin: 0 20px;\n}\n.bloco-servicos .progress-bar .bar .progress {\n  height: 1px;\n  background: #FFFFFF;\n  width: 0;\n}\n\n@keyframes slideDown {\n  from {\n    opacity: 0;\n    max-height: 0;\n  }\n\n  to {\n    max-height: 200px;\n    opacity: 1;\n  }\n}\n\n@media only screen and (min-width: 549px) {\n  .bloco-servicos .swiper-slide {\n    border-right: 2px solid #e6e6e673;\n  }\n}\n\n@media only screen and (min-width: 992px) {\n  .bloco-servicos .swiper-pagination {\n    display: none;\n  }\n\n  .bloco-servicos .swiper-slide-content p {\n    padding-right: 30px;\n  }\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content p {\n    display: block;\n    animation: slideDown 0.5s forwards;\n  }\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  .bloco-servicos .swiper-slide:hover {\t\n    background: transparent;\n  }\n  \/*.bloco-servicos .swiper-slide:hover {\n    background: rgb(0, 0, 0);\n    background: linear-gradient(\n      0deg,\n      rgba(0, 0, 0, 1) 0%,\n      rgba(0, 0, 0, 1) 2%,\n      rgba(0, 0, 0, 0.41360294117647056) 100%\n    );\n  }*\/\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content a span {\n    display: block;\n  }\n}\n\n@media only screen and (max-width: 992px) {\n  .bloco-servicos .swiper-slide {\n    background: rgba(000, 000, 000, 0.3);\n  }\n\n  .bloco-servicos {\n  \theight: 650px;\n\t}\n\n   .swiper-slide-content {\n     border-bottom: 15px solid #102F8E;\n   }\n  \n  .bloco-servicos .swiper-slide-content a span {\n    display: block;\n  }\n\n  .bloco-servicos .swiper-slide-content a {\n    color: #fff !important;\n  }\n\n  .bloco-servicos .swiper-slide-content a svg path {\n    fill: #3cc64d;\n  }\n\n  .bloco-servicos .bloco-servicos h2 {\n    font-size: 1.5rem;\n  }\n\n  .bloco-servicos .swiper-pagination-bullet {\n    opacity: 1;\n    background: #fff;\n  }\n\n  .bloco-servicos .swiper-pagination-bullet-active {\n    background: #e1b401;\n    width: 20px;\n    border-radius: 5px;\n  }\n  \n  .bloco-servicos .swiper-slide:hover .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  .bloco-servicos .swiper-slide:hover {\t\n    background: transparent;\n  }\n}\n\n.swiper-pagination.swiper-pagination-clickable.swiper-pagination-bullets.swiper-pagination-horizontal {\n    padding: 0 0 40px 0;\n}\n\n@media only screen and (max-width: 479px) {\n\n  .bloco-servicos .swiper-slide-active .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  \n  .bloco-servicos .swiper-slide-content h3 {\n    font-size: 24px;\n    line-height: 24px;\n  }\n  \n  .bloco-servicos .swiper-slide-content a {\n    justify-content: flex-start;\n  }\n  \n  .bloco-servicos .swiper-slide-content div {\n    padding: 40px 40px 30px;\n  }\n  \n  .bloco-servicos .swiper-button-next,\n  .bloco-servicos .swiper-button-prev {\n    top: unset;\n    bottom: 7%\n  }\n  \n  .bloco-servicos .swiper-button-prev {\n    left: unset;\n    right: 30%;\n  }\n  \n  .bloco-servicos .swiper-slide-content p {\n    padding-bottom: 10px;\n  }\n  \n  .bloco-servicos .swiper-slide-active {\n    background: #3F8EDD;\n    background: linear-gradient(\n      180deg,\n      rgba(0, 0, 0, 0.3) 0%,\n      \/*rgba(0, 0, 0, 1) 2%,*\/\n      rgba(0, 0, 0, 0) 50%\n    );\n  }\n  \n  .bloco-servicos .progress-bar {\n    display: flex;\n  }\n}\n\n<\/style>\n\n<div class=\"bloco-servicos\" id=\"uc_slider_segments_content_elementor_a458a06\" data-id=\"uc_slider_segments_content_elementor_a458a06\">\n    <h2><\/h2>\n    <div class=\"swiper-figure\">\n      <div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/09\/Segmentos_og.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/09\/Segmentos_energia-eletrica.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/09\/Segmentos_industria-processos.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/09\/Segmentos_manufatura.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/altusautomation.com\/wp-content\/uploads\/2024\/09\/Segmentos_infra.jpg);\">\n<\/div>\n\n    <\/div>\n    <div class=\"swiper swiper-servico\">\n      <div class=\"swiper-wrapper\">\n        <div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Oil and Gas<\/h3>\n      <p>Productive efficiency and high availability for Oil and Gas applications.<\/p>\n              <a href=\"\/oleo-e-gas\/\" title=\"Oil and Gas\" >\n          <span>See More<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Electrical Energy<\/h3>\n      <p>Performance and high availability for the Electric Power industry.<\/p>\n              <a href=\"\/energia-eletrica\" title=\"Electrical Energy\" >\n          <span>See More<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Process Industry<\/h3>\n      <p>Efficiency and productivity for the Process Industry<\/p>\n              <a href=\"\/industria-de-processos\" title=\"Process Industry\" >\n          <span>See More<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Manufacturing Industry<\/h3>\n      <p>Performance and high availability for the Manufacturing Industry<\/p>\n              <a href=\"\/industria-de-manufatura\" title=\"Manufacturing Industry\" >\n          <span>See More<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Infrastructure<\/h3>\n      <p>Integrated Infrastructure and Transportation Solutions<\/p>\n              <a href=\"\/infraestrutura\" title=\"Infrastructure\" >\n          <span>See More<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n\n      <\/div>\n      <div class=\"swiper-button-next\">\n        <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n          <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <path d=\"M27 20L34 27L27 34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <rect x=\"0.5\" y=\"0.5\" width=\"53\" height=\"53\" rx=\"26.5\" stroke=\"white\"\/>\n        <\/svg>\n      <\/div>\n      <div class=\"swiper-button-prev\">\n        <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n          <path d=\"M34 27H20\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <path d=\"M27 20L20 27L27 34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <rect x=\"-0.5\" y=\"0.5\" width=\"53\" height=\"53\" rx=\"26.5\" transform=\"matrix(-1 0 0 1 53 0)\" stroke=\"white\"\/>\n        <\/svg>\n      <\/div>\n      <div class=\"swiper-pagination\"><\/div>\n      <div class=\"progress-bar\">\n        <div class=\"index\"><\/div>\n        <div class=\"bar\">\n          <div class=\"progress\"><\/div>\n        <\/div>\n        <div class=\"length\"><\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<!-- end Slider Segmentos -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Solutions Your business protected against attacks With advances in communication technologies, machines and systems are becoming increasingly interconnected through the internet. In this context, protection against cyberattacks becomes essential to ensure the security, data integrity, and continuity of industrial operations. Request an assessment Do you want to implement your current project with us? We will [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2627","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/pages\/2627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/comments?post=2627"}],"version-history":[{"count":567,"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/pages\/2627\/revisions"}],"predecessor-version":[{"id":21584,"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/pages\/2627\/revisions\/21584"}],"wp:attachment":[{"href":"https:\/\/altusautomation.com\/en\/wp-json\/wp\/v2\/media?parent=2627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}