Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-6069


The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.


Published

2013-01-21T21:55:01.150

Last Modified

2025-07-02T21:15:39.193

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 10.0 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-23
  • Type: Secondary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application 3s-software codesys_runtime_system 2.4.0 Yes
Application 3s-software codesys_runtime_system 2.3.9.8 Yes
Application 3s-software codesys_runtime_system 2.3.9.35 Yes
Application 3s-software codesys_runtime_system 2.3.9.36 Yes
Application 3s-software codesys_runtime_system 2.3.9.37 Yes

References