VYPR
Critical severity10.0NVD Advisory· Published Jan 21, 2013· Updated Apr 29, 2026

CVE-2012-6069

CVE-2012-6069

Description

The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.

Affected products

5
  • cpe:2.3:a:3s-software:codesys_runtime_system:2.4.0:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:3s-software:codesys_runtime_system:2.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.8:*:*:*:*:*:*:*
    • cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.35:*:*:*:*:*:*:*
    • cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.36:*:*:*:*:*:*:*
    • cpe:2.3:a:3s-software:codesys_runtime_system:2.3.9.37:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.