HomePentest-Tools.com Logo

CODESYS Multiple Vulnerabilities (Oct 2012) - Active Check CVE-2012-6069CVE-2012-6068

Not available
CVSSv3 Score
Not available
Vulnerability description

Devices using the CODESYS Runtime Toolkit are prone to multiple vulnerabilities.

Risk description

The following flaws exist: - CVE-2012-6068: The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service. - CVE-2012-6069: The CODESYS Runtime Toolkits file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This allows an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.


Contact the vendor of the device about infos on a fixed firmware.

Not available
Detectable with
Network Scanner
Scan engine
Exploitable with Sniper
CVE Published
Jan 21, 2013
Detection added at
Software Type
Not available
Not available
Not available