perform input validation, which allows an attacker to access files and
directories outside the intended scope. This may allow an attacker to
upload and download any file on the device. This could allow the
attacker to affect the availability, integrity, and confidentiality of
the device.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2012-5943 | The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device. |
Solution
CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.
Workaround
3S also recommends the usage of standard security methods like firewalls or virtual private network (VPN) access to prevent unauthorized access to the controller.
Wed, 02 Jul 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Directory traversal vulnerability in the Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x allows remote attackers to read, overwrite, or create arbitrary files via a .. (dot dot) in a request to the TCP listener service. | The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device. |
Title | 3S CoDeSys Relative Path Traversal | |
Weaknesses | CWE-23 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-07-02T20:15:19.655Z
Reserved: 2012-12-05T00:00:00
Link: CVE-2012-6069

No data.

Status : Deferred
Published: 2013-01-21T21:55:01.150
Modified: 2025-07-02T21:15:39.193
Link: CVE-2012-6069

No data.

No data.