Lucene search

K
cvelistCERTVDECVELIST:CVE-2018-25048
HistoryMar 23, 2023 - 10:45 a.m.

CVE-2018-25048 Codesys Runtime Improper Limitation of a Pathname

2023-03-2310:45:36
CWE-22
CERTVDE
www.cve.org
cve-2018-25048
path traversal
remote attack

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.0%

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Control for BeagleBone",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": " Control for emPC-A/iMX6",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control for IOT2000",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control for PFC100",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control for PFC200",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control for Raspberry Pi",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control RTE V3 (all variants)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control Win V3 (all variants)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "V3 Simulation Runtime (part of the CODESYS Development System)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "HMI V3 (all variants)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "V3 Remote Target Visu (all variants)",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Control V3 Runtime System Toolkit",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "V3 Embedded Target Visu Toolkit",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "V3 Remote Target Visu Toolkit",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "3.5.12.30",
        "status": "affected",
        "version": "3.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Runtime Toolkit 32 bit embedded",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "2.3.2.10",
        "status": "affected",
        "version": "2.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Runtime Toolkit 32 bit full",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "2.4.7.52",
        "status": "affected",
        "version": "2.0.0.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Runtime PLCWinNT",
    "vendor": "CODESYS",
    "versions": [
      {
        "lessThan": "2.4.7.52",
        "status": "affected",
        "version": "2.0.0.0",
        "versionType": "custom"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.0%

Related for CVELIST:CVE-2018-25048