The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html | vendor advisory |
http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01 | us government resource |
http://www.digitalbond.com/tools/basecamp/3s-codesys/ | |
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf | us government resource |