The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.
In Weintek's cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.
In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.
In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password.
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write.
CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check.
CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.
CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow.
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow.
CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.
An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.
In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials.
A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19. A crafted request may cause a buffer overflow and could therefore execute arbitrary code on the web server or lead to a denial-of-service condition due to a crash in the web server.
An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455.
An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A specially crafted web server request may allow the upload of arbitrary files (with a dangerous type) to the CODESYS Web Server without authorization which may allow remote code execution.
A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A malicious user could overflow the stack buffer by providing overly long strings to functions that handle the XML. Because the function does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2012-6069 | CRITICAL | The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which … | › |
| CVE-2023-43492 | CRITICAL | In Weintek's cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buf… | › |
| CVE-2022-31806 | CRITICAL | In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is … | › |
| CVE-2022-31802 | CRITICAL | In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified passwo… | › |
| CVE-2021-33485 | CRITICAL | CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow. | › |
| CVE-2021-30193 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write. | › |
| CVE-2021-30192 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check. | › |
| CVE-2021-30190 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control. | › |
| CVE-2021-30189 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow. | › |
| CVE-2021-30188 | CRITICAL | CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. | › |
| CVE-2020-10245 | CRITICAL | CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer ove… | › |
| CVE-2019-18858 | CRITICAL | CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Bu… | › |
| CVE-2019-16265 | CRITICAL | CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow. | › |
| CVE-2019-13548 | CRITICAL | CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted… | › |
| CVE-2019-9010 | CRITICAL | An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly veri… | › |
| CVE-2018-10612 | CRITICAL | In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user acce… | › |
| CVE-2018-5440 | CRITICAL | A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all… | › |
| CVE-2018-5459 | CRITICAL | An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.… | › |
| CVE-2017-6027 | CRITICAL | An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server… | › |
| CVE-2017-6025 | CRITICAL | A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server.… | › |
| CVE-2012-6068 | CRITICAL | The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which… | › |
| CVE-2021-34584 | CRITICAL | Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a de… | › |
| CVE-2021-30194 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read. | › |