CVE-2012-6068
high-risk
Published 2013-01-21
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
Do I need to act?
~
4.4% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
Codesys Runtime System
Codesys Runtime System
Codesys Runtime System
Codesys Runtime System
Codesys Runtime System
Affected Vendors
References (9)
US Government Resource
http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01
US Government Resource
http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf
52
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
8/34 · Low
Exposure
12/34 · Low