CVE-2018-25048
23.03.2023, 11:15
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Vendor | Product | Version |
---|---|---|
codesys | control_for_beaglebone | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_for_empc-a\/imx6 | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_for_iot2000 | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_for_pfc100 | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_for_pfc200 | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_for_raspberry_pi | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_rte | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_v3_runtime_system_toolkit | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | control_win | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
codesys | embedded_target_visu_toolkit | 3.0 ≤ 𝑥 < 3.5.12.30 |
codesys | hmi | 3.0 ≤ 𝑥 < 3.5.12.30 |
codesys | remote_target_visu_toolkit | 3.0 ≤ 𝑥 < 3.5.12.30 |
codesys | runtime_plcwinnt | 2.0.0.0 ≤ 𝑥 < 2.4.7.52 |
codesys | runtime_system_toolkit | 2.0.0.0 ≤ 𝑥 < 2.4.7.52 |
codesys | runtime_system_toolkit | 3.5.15.0 |
codesys | simulation_runtime | 3.0.0.0 ≤ 𝑥 < 3.5.12.30 |
𝑥
= Vulnerable software versions