The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service. | The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service. |
Title | 3S CoDeSys Improper Access Control | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-07-02T20:12:04.890Z
Reserved: 2012-12-05T00:00:00
Link: CVE-2012-6068

No data.

Status : Deferred
Published: 2013-01-21T21:55:01.103
Modified: 2025-07-02T20:15:28.747
Link: CVE-2012-6068

No data.