CVE-2012-6068

3S CoDeSys Improper Access Control

Description

The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.

Remediation

Solution:

  • CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.

Workaround:

  • 3S also recommends the usage of standard security methods like firewalls or virtual private network (VPN) access to prevent unauthorized access to the controller.

Categories

9.8
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 1.87% Top 20%
Vendor Advisory codesys.com
Affected: 3S-Smart Software Solutions CODESYS Control Runtime embedded
Affected: 3S-Smart Software Solutions CODESYS Control Runtime full
Affected: 3S-Smart Software Solutions CODESYS Control RTE
Affected: Festo CECX-X-C1 Modular Master Controller with CoDeSys
Affected: Festo CECX-X-M1 Modular Controller with CoDeSys and SoftMotion
Affected: 3S-Smart Software Solutions CoDeSys
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2012-6068?
CVE-2012-6068 has been scored as a critical severity vulnerability.
How to fix CVE-2012-6068?
To fix CVE-2012-6068: CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.
Is CVE-2012-6068 being actively exploited in the wild?
It is possible that CVE-2012-6068 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~2% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2012-6068?
CVE-2012-6068 affects 3S-Smart Software Solutions CODESYS Control Runtime embedded, 3S-Smart Software Solutions CODESYS Control Runtime full, 3S-Smart Software Solutions CODESYS Control RTE, Festo CECX-X-C1 Modular Master Controller with CoDeSys, Festo CECX-X-M1 Modular Controller with CoDeSys and SoftMotion, 3S-Smart Software Solutions CoDeSys.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.