{ "schema_version": "1.4.0", "id": "GHSA-hh9j-6v4h-23q7", "modified": "2025-07-02T21:31:54Z", "published": "2022-05-17T04:44:52Z", "aliases": [ "CVE-2012-6068" ], "details": "The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to (1) execute commands via the command-line interface in the TCP listener service or (2) transfer files via requests to the TCP listener service.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6068" }, { "type": "WEB", "url": "https://us.codesys.com/ecosystem/security" }, { "type": "WEB", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-13-011-01" }, { "type": "WEB", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-084-01" }, { "type": "WEB", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-084-01" }, { "type": "WEB", "url": "http://www.codesys.com/news-events/press-releases/detail/article/sicherheitsluecke-in-codesys-v23-laufzeitsystem.html" }, { "type": "WEB", "url": "http://www.digitalbond.com/tools/basecamp/3s-codesys" }, { "type": "WEB", "url": "http://www.us-cert.gov/control_systems/pdf/ICSA-13-011-01.pdf" } ], "database_specific": { "cwe_ids": [ "CWE-284" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-01-21T21:55:00Z" } }