8.8

CVE-2023-6357

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.

Data is provided by the National Vulnerability Database (NVD)
CodesysControl For Beaglebone Sl Version < 4.11.0.0
CodesysControl For Empc-a/imx6 Version < 4.11.0.0
CodesysControl For Iot2000 Sl Version < 4.11.0.0
CodesysControl For Linux Arm Sl Version < 4.11.0.0
CodesysControl For Linux Sl Version < 4.11.0.0
CodesysControl For Pfc100 Sl Version < 4.11.0.0
CodesysControl For Pfc200 Sl Version < 4.11.0.0
CodesysControl For Plcnext Sl Version < 4.11.0.0
CodesysControl For Raspberry Pi Sl Version < 4.11.0.0
CodesysRuntime Toolkit Version < 3.5.19.50
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.28% 0.514
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
info@cert.vde.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.