CoDeSys Authentication Bypass Directory Traversal

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote device is affected by a directory traversal vulnerability.

Description :

The remote device is a CoDeSys PLC (programmable logic controller).
Nessus was able to bypass the authentication mechanism and read an
arbitrary file on the device by using a directory traversal string.

See also :

Solution :

There are currently no known fixes. As a workaround, restrict access
to the device.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 7.8
Public Exploit Available : true

Family: SCADA

Nessus Plugin ID: 62796 ()

Bugtraq ID: 52942

CVE ID: CVE-2012-6068

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now