CVE-2018-25048
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
23/03/2023
Last modified:
30/03/2023
Description
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_v3_runtime_system_toolkit:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:* | 3.0.0.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:* | 3.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:* | 3.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:* | 3.0 (including) | 3.5.12.30 (excluding) |
| cpe:2.3:a:codesys:runtime_plcwinnt:*:*:*:*:*:*:*:* | 2.0.0.0 (including) | 2.4.7.52 (excluding) |
| cpe:2.3:a:codesys:runtime_system_toolkit:*:*:*:*:*:*:x86:* | 2.0.0.0 (including) | 2.4.7.52 (excluding) |
| cpe:2.3:a:codesys:runtime_system_toolkit:3.5.15.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



