A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
Attack Parameters
Impact Assessment
CVSS Vector v3.1
A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.
How easy to exploit
Severity of consequences
Likelihood of exploitation in next 30 days