2022-04-07 18:21:16
CERTVDE
PUBLISHED
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.