In multiple products of CODESYS v3 in multiple versions a remote low privileged userĀ could utilize this vulnerability to read and modify system files and OS resources or DoS the device.
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Control_for_beaglebone_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_empc-a/imx6_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_iot2000_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_linux_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_pfc100_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_pfc200_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_plcnext_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_raspberry_pi_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_for_wago_touch_panels_600_sl | Codesys | 3.0 (including) | 4.8.0.0 (excluding) |
Control_rte_sl | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Control_rte_sl_(for_beckhoff_cx) | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Control_win_sl | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Development_system | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Hmi_sl | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Runtime_toolkit | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Safety_sil2 | Codesys | 3.0 (including) | 3.5.19.0 (excluding) |
Developers often choose default values that leave the product as open and easy to use as possible out-of-the-box, under the assumption that the administrator can (or should) change the default value. However, this ease-of-use comes at a cost when the default is insecure and the administrator does not change it.