3S CoDeSys Relative Path Traversal
Summary
| CVE | CVE-2012-6069 |
|---|---|
| State | PUBLISHED |
| Assigner | icscert |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-01-21 21:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device. |
Risk And Classification
Primary CVSS: v3.1 10 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Problem Types: CWE-23 | CWE-22 | CWE-23 CWE-23
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 10 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 10 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
CVSS v3.1 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS v2.0 Breakdown
AV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | 3s-software | Codesys Runtime System | 2.3.9.35 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.36 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.37 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.8 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.4.0 | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | 3S-Smart Software Solutions | CODESYS Control Runtime Embedded | affected 2.3.2.8 custom | Not specified |
| CNA | 3S-Smart Software Solutions | CODESYS Control Runtime Full | affected 2.4.7.40 custom | Not specified |
| CNA | 3S-Smart Software Solutions | CODESYS Control RTE | affected 2.3.7.17 custom | Not specified |
| CNA | Festo | CECX-X-C1 Modular Master Controller With CoDeSys | affected All | Not specified |
| CNA | Festo | CECX-X-M1 Modular Controller With CoDeSys And SoftMotion | affected All | Not specified |
| CNA | 3S-Smart Software Solutions | CoDeSys | unaffected 3.X | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 404 - File Not Found | CISA | af854a3a-2127-422b-91ae-364da2661108 | www.us-cert.gov | US Government Resource |
| Project Basecamp 3S CoDeSys Vulns and Tools | af854a3a-2127-422b-91ae-364da2661108 | www.digitalbond.com | |
| CoDeSys CVE-2012-6069 Directory Traversal Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Detail | af854a3a-2127-422b-91ae-364da2661108 | www.codesys.com | Vendor Advisory |
| Festo CECX-X-(C1/M1) Controller Vulnerabilities | ICS-CERT | af854a3a-2127-422b-91ae-364da2661108 | ics-cert.us-cert.gov | US Government Resource |
| www.cisa.gov/news-events/ics-advisories/icsa-14-084-01 | [email protected] | www.cisa.gov | |
| www.cisa.gov/news-events/ics-advisories/icsa-13-011-01 | [email protected] | www.cisa.gov | |
| us.codesys.com/ecosystem/security | [email protected] | us.codesys.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Independent researcher Reid Wightman of IOActive, formerly of Digital Bond has validated that the patch, issued by 3S, mitigates theses vulnerabilities. (en)
Additional Advisory Data
Solutions
CNA: CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.
Workarounds
CNA: 3S also recommends the usage of standard security methods like firewalls or virtual private network (VPN) access to prevent unauthorized access to the controller.