CVE-2023-6357

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_arm_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
References () https://https://cert.vde.com/en/advisories/VDE-2023-066 - Broken Link () https://https://cert.vde.com/en/advisories/VDE-2023-066 - Broken Link

11 Dec 2023, 20:49

Type Values Removed Values Added
First Time Codesys control For Empc-a\/imx6
Codesys control For Beaglebone Sl
Codesys control For Pfc200 Sl
Codesys control For Raspberry Pi Sl
Codesys control For Iot2000 Sl
Codesys control For Linux Sl
Codesys control For Plcnext Sl
Codesys runtime Toolkit
Codesys control For Pfc100 Sl
Codesys control For Linux Arm Sl
Codesys control For Wago Touch Panels 600 Sl
Codesys
CPE cpe:2.3:a:codesys:control_for_empc-a\/imx6:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_linux_arm_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*
cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*
References
  • (MISC) https://cert.vde.com/en/advisories/VDE-2023-066 - Mitigation, Third Party Advisory
References () https://https://cert.vde.com/en/advisories/VDE-2023-066 - () https://https://cert.vde.com/en/advisories/VDE-2023-066 - Broken Link

05 Dec 2023, 15:27

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-05 15:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6357

Mitre link : CVE-2023-6357

CVE.ORG link : CVE-2023-6357


JSON object : View

Products Affected

codesys

  • control_for_iot2000_sl
  • control_for_linux_sl
  • control_for_beaglebone_sl
  • control_for_raspberry_pi_sl
  • control_for_plcnext_sl
  • control_for_pfc100_sl
  • control_for_empc-a\/imx6
  • runtime_toolkit
  • control_for_wago_touch_panels_600_sl
  • control_for_pfc200_sl
  • control_for_linux_arm_sl
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')