First published: Tue Dec 05 2023(Updated: )
A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
CODESYS Control Beaglebone SL | <4.11.0.0 | |
CODESYS Control for empc-a/imx6 | <4.11.0.0 | |
CODESYS Control for IoT2000 | <4.11.0.0 | |
CODESYS Control for Linux ARM SL | <4.11.0.0 | |
CODESYS Control for Linux | <4.11.0.0 | |
CODESYS Control PFC100 SL | <4.11.0.0 | |
WAGO PFC200 | <4.11.0.0 | |
CODESYS Control for PLCnext | <4.11.0.0 | |
CODESYS Control Raspberry Pi SL | <4.11.0.0 | |
CODESYS Control for WAGO Touch Panels 600 | <4.11.0.0 | |
CoDeSys Runtime Toolkit | <3.5.19.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6357 is classified as a low-severity vulnerability.
To fix CVE-2023-6357, update to a version of CODESYS Control that is above 4.11.0.0 or 3.5.19.50.
CVE-2023-6357 affects CODESYS Control versions up to 4.11.0.0 and CoDeSys Runtime Toolkit versions up to 3.5.19.50.
Yes, CVE-2023-6357 can be exploited remotely by a low-privileged attacker.
Exploiting CVE-2023-6357 could allow an attacker to execute additional system commands, potentially gaining full control of the device.