HomePentest-Tools.com Logo

CODESYS Multiple Vulnerabilities (Oct 2012) - Active Check CVE-2012-6069CVE-2012-6068

Severity
Not available
CVSSv3 Score
Not available
Vulnerability description

Devices using the CODESYS Runtime Toolkit are prone to multiple vulnerabilities.

Risk description

The following flaws exist: - CVE-2012-6068: The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service. - CVE-2012-6069: The CODESYS Runtime Toolkits file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This allows an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.

Recommendation

Contact the vendor of the device about infos on a fixed firmware.

Codename
Not available
Detectable with
Network Scanner
Scan engine
OpenVAS
Exploitable with Sniper
No
CVE Published
Jan 21, 2013
Detection added at
Software Type
Not available
Vendor
Not available
Product
Not available