codesys runtime_toolkit 对外部实体的文件或目录可访问

CVE编号

CVE-2022-32143

利用情况

暂无

补丁情况

N/A

披露时间

2022-06-24
漏洞描述
In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 codesys plcwinnt * From
(including)
2.0
Up to
(excluding)
2.4.7.57
运行在以下环境
应用 codesys runtime_toolkit * From
(including)
2.0
Up to
(excluding)
2.4.7.57
CVSS3评分
8.8
  • 攻击路径
    网络
  • 攻击复杂度
  • 权限要求
  • 影响范围
    未更改
  • 用户交互
  • 可用性
  • 保密性
  • 完整性
CWE-ID 漏洞类型
CWE-552 对外部实体的文件或目录可访问
阿里云安全产品覆盖情况