CoDeSys Access Security Bypass Vulnerability

CoDeSys is prone to a security-bypass vulnerability that may allow attackers to perform actions without proper authentication.

Attackers can exploit this issue to bypass security restrictions to perform unauthorized actions and upload configuration changes to the device; this may aid in launching further attacks.

Successfully exploiting this issue may also result in arbitrary code-execution.


Privacy Statement
Copyright 2010, SecurityFocus