A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2023-066 | Mitigation Third Party Advisory |
https://https://cert.vde.com/en/advisories/VDE-2023-066 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-12-05 15:15
Updated : 2023-12-11 20:49
NVD link : CVE-2023-6357
Mitre link : CVE-2023-6357
CVE.ORG link : CVE-2023-6357
JSON object : View
Products Affected
codesys
- control_for_pfc200_sl
- control_for_pfc100_sl
- control_for_plcnext_sl
- control_for_iot2000_sl
- control_for_empc-a\/imx6
- runtime_toolkit
- control_for_linux_sl
- control_for_wago_touch_panels_600_sl
- control_for_raspberry_pi_sl
- control_for_beaglebone_sl
- control_for_linux_arm_sl
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')