CVE-2012-6069

3S CoDeSys Relative Path Traversal

Description

The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.

Remediation

Solution:

  • CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.

Workaround:

  • 3S also recommends the usage of standard security methods like firewalls or virtual private network (VPN) access to prevent unauthorized access to the controller.

Categories

10.0
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.98% Top 25%
Vendor Advisory codesys.com
Affected: 3S-Smart Software Solutions CODESYS Control Runtime embedded
Affected: 3S-Smart Software Solutions CODESYS Control Runtime full
Affected: 3S-Smart Software Solutions CODESYS Control RTE
Affected: Festo CECX-X-C1 Modular Master Controller with CoDeSys
Affected: Festo CECX-X-M1 Modular Controller with CoDeSys and SoftMotion
Affected: 3S-Smart Software Solutions CoDeSys
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2012-6069?
CVE-2012-6069 has been scored as a critical severity vulnerability.
How to fix CVE-2012-6069?
To fix CVE-2012-6069: CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.
Is CVE-2012-6069 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2012-6069 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2012-6069?
CVE-2012-6069 affects 3S-Smart Software Solutions CODESYS Control Runtime embedded, 3S-Smart Software Solutions CODESYS Control Runtime full, 3S-Smart Software Solutions CODESYS Control RTE, Festo CECX-X-C1 Modular Master Controller with CoDeSys, Festo CECX-X-M1 Modular Controller with CoDeSys and SoftMotion, 3S-Smart Software Solutions CoDeSys.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.