Codesys

Runtime Toolkit

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 01.12.2025 10:02:33
  • Zuletzt bearbeitet 01.12.2025 15:39:33

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

  • EPSS 0.11%
  • Veröffentlicht 01.12.2025 10:00:44
  • Zuletzt bearbeitet 01.12.2025 15:39:33

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially caus...

  • EPSS 0.04%
  • Veröffentlicht 04.08.2025 08:15:48
  • Zuletzt bearbeitet 04.08.2025 15:06:15

A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all servic...

  • EPSS 0.02%
  • Veröffentlicht 04.08.2025 08:15:47
  • Zuletzt bearbeitet 04.08.2025 15:06:15

CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.

  • EPSS 0.1%
  • Veröffentlicht 18.03.2025 11:15:39
  • Zuletzt bearbeitet 18.03.2025 11:15:39

Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.

  • EPSS 0.11%
  • Veröffentlicht 18.03.2025 11:03:17
  • Zuletzt bearbeitet 18.03.2025 11:15:39

An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.

  • EPSS 0.61%
  • Veröffentlicht 25.09.2024 08:15:04
  • Zuletzt bearbeitet 26.09.2024 13:32:02

An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.

  • EPSS 0.81%
  • Veröffentlicht 04.06.2024 09:15:09
  • Zuletzt bearbeitet 21.11.2024 09:46:44

An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.

  • EPSS 0.28%
  • Veröffentlicht 05.12.2023 15:15:08
  • Zuletzt bearbeitet 21.11.2024 08:43:41

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.

  • EPSS 0.6%
  • Veröffentlicht 23.03.2023 12:15:12
  • Zuletzt bearbeitet 21.11.2024 07:34:49

In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.