// For flags

CVE-2023-6357

OS Command Injection in multiple CODESYS products

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.

Un atacante remoto con pocos privilegios podría aprovechar la vulnerabilidad e inyectar comandos adicionales del sistema a través de librerías del sistema de archivos que podrían darle al atacante el control total del dispositivo.

*Credits: Chuya Hayakawa of 00One, Inc.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-11-28 CVE Reserved
  • 2023-12-05 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-11-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Codesys
Search vendor "Codesys"
Control For Beaglebone Sl
Search vendor "Codesys" for product "Control For Beaglebone Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Beaglebone Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Empc-a\/imx6
Search vendor "Codesys" for product "Control For Empc-a\/imx6"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Empc-a\/imx6" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Iot2000 Sl
Search vendor "Codesys" for product "Control For Iot2000 Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Iot2000 Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Linux Arm Sl
Search vendor "Codesys" for product "Control For Linux Arm Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Linux Arm Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Linux Sl
Search vendor "Codesys" for product "Control For Linux Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Linux Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc100 Sl
Search vendor "Codesys" for product "Control For Pfc100 Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Pfc100 Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Pfc200 Sl
Search vendor "Codesys" for product "Control For Pfc200 Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Pfc200 Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Plcnext Sl
Search vendor "Codesys" for product "Control For Plcnext Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Plcnext Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Raspberry Pi Sl
Search vendor "Codesys" for product "Control For Raspberry Pi Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Raspberry Pi Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Control For Wago Touch Panels 600 Sl
Search vendor "Codesys" for product "Control For Wago Touch Panels 600 Sl"
< 4.11.0.0
Search vendor "Codesys" for product "Control For Wago Touch Panels 600 Sl" and version " < 4.11.0.0"
-
Affected
Codesys
Search vendor "Codesys"
Runtime Toolkit
Search vendor "Codesys" for product "Runtime Toolkit"
< 3.5.19.50
Search vendor "Codesys" for product "Runtime Toolkit" and version " < 3.5.19.50"
-
Affected