Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-25048— Codesys Runtime Improper Limitation of a Pathname

CVSS 8.8 · High EPSS 1.00% · P77
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-25048

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Codesys Runtime Improper Limitation of a Pathname
Source: NVD (National Vulnerability Database)
Vulnerability Description
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
3s-smart Software Solutions CODESYS 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
3s-smart Software Solutions CODESYS是德国德国3S智能软件系统方案有限公司(3s-smart Software Solutions)公司的一套控制器开发系统 3s-smart Software Solutions CODESYS存在路径遍历漏洞,该漏洞源于允许远程低权限攻击者利用路径遍历漏洞访问和修改所有系统文件并对设备进行DoS攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CODESYSControl for BeagleBone 3.0.0.0 ~ 3.5.12.30 -
CODESYS Control for emPC-A/iMX6 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl for IOT2000 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl for PFC100 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl for PFC200 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl for Raspberry Pi 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl RTE V3 (all variants) 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl Win V3 (all variants) 3.0.0.0 ~ 3.5.12.30 -
CODESYSV3 Simulation Runtime (part of the CODESYS Development System) 3.0.0.0 ~ 3.5.12.30 -
CODESYSHMI V3 (all variants) 3.0.0.0 ~ 3.5.12.30 -
CODESYSV3 Remote Target Visu (all variants) 3.0.0.0 ~ 3.5.12.30 -
CODESYSControl V3 Runtime System Toolkit 3.0.0.0 ~ 3.5.12.30 -
CODESYSV3 Embedded Target Visu Toolkit 3.0.0.0 ~ 3.5.12.30 -
CODESYSV3 Remote Target Visu Toolkit 3.0.0.0 ~ 3.5.12.30 -
CODESYSRuntime Toolkit 32 bit embedded 2.0.0.0 ~ 2.3.2.10 -
CODESYSRuntime Toolkit 32 bit full 2.0.0.0 ~ 2.4.7.52 -
CODESYSRuntime PLCWinNT 2.0.0.0 ~ 2.4.7.52 -

II. Public POCs for CVE-2018-25048

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-25048

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2018-25048

No comments yet


Leave a comment