Description
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Published: 2023-03-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-13817 The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
History

Wed, 19 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Codesys Control For Beaglebone Control For Empc-a\/imx6 Control For Iot2000 Control For Pfc100 Control For Pfc200 Control For Raspberry Pi Control Rte Control V3 Runtime System Toolkit Control Win Embedded Target Visu Toolkit Hmi Remote Target Visu Toolkit Runtime Plcwinnt Runtime System Toolkit Simulation Runtime
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-02-19T21:00:29.711Z

Reserved: 2022-12-07T12:06:08.365Z

Link: CVE-2018-25048

cve-icon Vulnrichment

Updated: 2024-08-05T12:26:39.648Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T11:15:12.730

Modified: 2024-11-21T04:03:26.283

Link: CVE-2018-25048

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses