The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.
History

Wed, 02 Jul 2025 20:30:00 +0000

Type Values Removed Values Added
Description Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.
Title 3S CoDeSys Relative Path Traversal
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-02T20:15:19.655Z

Reserved: 2012-12-05T00:00:00

Link: CVE-2012-6069

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-01-21T21:55:01.150

Modified: 2025-07-02T21:15:39.193

Link: CVE-2012-6069

cve-icon Redhat

No data.