6.5

CVE-2023-37551

In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.

Data is provided by the National Vulnerability Database (NVD)
CodesysControl For Beaglebone Sl Version < 4.10.0.0
CodesysControl For Empc-a/imx6 Sl Version < 4.10.0.0
CodesysControl For Iot2000 Sl Version < 4.10.0.0
CodesysControl For Linux Sl Version < 4.10.0.0
CodesysControl For Pfc100 Sl Version < 4.10.0.0
CodesysControl For Pfc200 Sl Version < 4.10.0.0
CodesysControl For Plcnext Sl Version < 4.10.0.0
CodesysControl For Raspberry Pi Sl Version < 4.10.0.0
CodesysControl Rte Sl Version < 3.5.19.20
CodesysControl Rte Sl (for Beckhoff Cx) Version < 3.5.19.20
CodesysControl Runtime System Toolkit Version < 3.5.19.20
CodesysControl Win Sl Version < 3.5.19.20
CodesysDevelopment System Version < 3.5.19.20
CodesysHmi Version < 3.5.19.20
CodesysSafety Sil2 Version < 3.5.19.20
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.196
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
info@cert.vde.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE-552 Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.