CVE-2012-6069

The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:3s-software:codesys_runtime_system:2.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.8:*:*:*:*:*:*:*
cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.35:*:*:*:*:*:*:*
cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.36:*:*:*:*:*:*:*
cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.37:*:*:*:*:*:*:*

History

02 Jul 2025, 21:15

Type Values Removed Values Added
CWE CWE-23
Summary (en) Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. (en) The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.
References
  • () https://us.codesys.com/ecosystem/security/ -
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01 -
  • () https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01 -
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 10.0

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 - US Government Resource () http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 - US Government Resource
References () http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html - Vendor Advisory () http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html - Vendor Advisory
References () http://www.digitalbond.com/tools/basecamp/3s-codesys/ - () http://www.digitalbond.com/tools/basecamp/3s-codesys/ -
References () http://www.securityfocus.com/bid/56300 - () http://www.securityfocus.com/bid/56300 -
References () http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf - US Government Resource () http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf - US Government Resource

Information

Published : 2013-01-21 21:55

Updated : 2025-07-02 21:15


NVD link : CVE-2012-6069

Mitre link : CVE-2012-6069

CVE.ORG link : CVE-2012-6069


JSON object : View

Products Affected

3s-software

  • codesys_runtime_system
CWE
CWE-23

Relative Path Traversal

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')