The CoDeSys Runtime Toolkit’s file transfer functionality does not
perform input validation, which allows an attacker to access files and
directories outside the intended scope. This may allow an attacker to
upload and download any file on the device. This could allow the
attacker to affect the availability, integrity, and confidentiality of
the device.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. | The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device. |
Title | 3S CoDeSys Relative Path Traversal | |
Weaknesses | CWE-23 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-07-02T20:15:19.655Z
Reserved: 2012-12-05T00:00:00
Link: CVE-2012-6069

No data.

Status : Deferred
Published: 2013-01-21T21:55:01.150
Modified: 2025-07-02T21:15:39.193
Link: CVE-2012-6069

No data.