Codesys

Runtime Toolkit

28 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 04.08.2025 08:15:48
  • Last modified 04.08.2025 15:06:15

A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all servic...

  • EPSS 0.01%
  • Published 04.08.2025 08:15:47
  • Last modified 04.08.2025 15:06:15

CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.

  • EPSS 0.06%
  • Published 18.03.2025 11:15:39
  • Last modified 18.03.2025 11:15:39

Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.

  • EPSS 0.1%
  • Published 18.03.2025 11:03:17
  • Last modified 18.03.2025 11:15:39

An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.

  • EPSS 0.62%
  • Published 25.09.2024 08:15:04
  • Last modified 26.09.2024 13:32:02

An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.

  • EPSS 0.81%
  • Published 04.06.2024 09:15:09
  • Last modified 21.11.2024 09:46:44

An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.

  • EPSS 0.28%
  • Published 05.12.2023 15:15:08
  • Last modified 21.11.2024 08:43:41

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.

  • EPSS 0.6%
  • Published 23.03.2023 12:15:12
  • Last modified 21.11.2024 07:34:49

In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.

  • EPSS 1.11%
  • Published 24.06.2022 08:15:08
  • Last modified 21.11.2024 07:05:50

In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the con...

  • EPSS 1.03%
  • Published 24.06.2022 08:15:08
  • Last modified 21.11.2024 07:05:50

Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or ...