Files
CVEs-PoC/2012/CVE-2012-6068.md
T
2025-09-29 21:09:30 +02:00

25 lines
1.5 KiB
Markdown

### [CVE-2012-6068](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6068)
![](https://img.shields.io/static/v1?label=Product&message=CECX-X-C1%20Modular%20Master%20Controller%20with%20CoDeSys&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CECX-X-M1%20Modular%20Controller%20with%20CoDeSys%20and%20SoftMotion&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20RTE&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20Runtime%20embedded&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CODESYS%20Control%20Runtime%20full&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=CoDeSys&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=All%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284&color=brightgreen)
### Description
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.
### POC
#### Reference
- http://www.digitalbond.com/tools/basecamp/3s-codesys/
#### Github
No PoCs found on GitHub currently.