The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
2023-03-23T11:15:12.730
2024-11-21T04:03:26.283
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | codesys | control_for_beaglebone | < 3.5.12.30 | Yes |
Application | codesys | control_for_empc-a\/imx6 | < 3.5.12.30 | Yes |
Application | codesys | control_for_iot2000 | < 3.5.12.30 | Yes |
Application | codesys | control_for_pfc100 | < 3.5.12.30 | Yes |
Application | codesys | control_for_pfc200 | < 3.5.12.30 | Yes |
Application | codesys | control_for_raspberry_pi | < 3.5.12.30 | Yes |
Application | codesys | control_rte | < 3.5.12.30 | Yes |
Application | codesys | control_v3_runtime_system_toolkit | < 3.5.12.30 | Yes |
Application | codesys | control_win | < 3.5.12.30 | Yes |
Application | codesys | embedded_target_visu_toolkit | < 3.5.12.30 | Yes |
Application | codesys | hmi | < 3.5.12.30 | Yes |
Application | codesys | remote_target_visu_toolkit | < 3.5.12.30 | Yes |
Application | codesys | runtime_plcwinnt | < 2.4.7.52 | Yes |
Application | codesys | runtime_system_toolkit | < 2.4.7.52 | Yes |
Application | codesys | runtime_system_toolkit | 3.5.15.0 | Yes |
Application | codesys | simulation_runtime | < 3.5.12.30 | Yes |