Description
In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required
Published: 2022-06-24
Score: 8.8 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-53384 In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00833}

epss

{'score': 0.01107}


Subscriptions

Codesys Plcwinnt Runtime Toolkit
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T17:28:17.867Z

Reserved: 2022-05-31T00:00:00.000Z

Link: CVE-2022-32143

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-24T08:15:08.167

Modified: 2024-11-21T07:05:50.140

Link: CVE-2022-32143

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses