{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T13:30:08.482","vulnerabilities":[{"cve":{"id":"CVE-2021-36763","sourceIdentifier":"cve@mitre.org","published":"2021-08-03T16:15:08.657","lastModified":"2024-11-21T06:14:02.597","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties."},{"lang":"es","value":"En CODESYS V3 web server versiones anteriores a 3.5.17.10, los archivos o directorios son accesibles para las partes externas"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-552"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:beaglebone_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"57DD6E2E-9B12-4C30-9CCF-26C5EFCFC0EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:empc-a\\/imx6_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"79E8DFCC-74F7-4B0D-A476-D13CBB32EDEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:iot2000_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"58160302-830A-463B-AE5F-782B01893F40"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:linux_sl:*:*","versionEndIncluding":"4.2.0.0","matchCriteriaId":"2E740918-B35E-4583-8580-046A7C7F3113"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:pfc100_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"F00E63D5-8CA2-4082-B522-4B0C51772A4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:pfc200_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"6890F3F3-6DF2-4D0C-A431-B3705900E1EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:plcnext_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"7D6CA947-A0F3-4F45-804B-BAD4BD24CBC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:raspberry_pi_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"1545D5A9-739E-4C36-933A-B87A3D593A22"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control:*:*:*:*:*:wago_touch_panels_600_sl:*:*","versionEndExcluding":"4.2.0.0","matchCriteriaId":"7D0A2D1F-F297-4D5D-8FB1-1C80297E91A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte:*:*:*:*:*:-:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"102C898A-8CA9-4C6E-AAAD-ED947F6DCEA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_rte:*:*:*:*:*:beckhoff_cx:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"C629084B-E59E-4FA4-A866-7F2FE8C6D26B"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"48B1957E-472D-4A21-A8FC-DF2AF0C118F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"FBCFD26C-0262-4D2B-99CA-E7EA0E6B75E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"B640C5A9-8241-4191-87F6-E31D6902702E"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"9116B38E-7B7C-48DB-B742-A8741EB63892"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.17.10","matchCriteriaId":"C86F931B-F172-4B00-B484-48048756655F"}]}]}],"references":[{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16803&token=0b8edf9276dc39ee52f43026c415c5b38085d90a&download=","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16803&token=0b8edf9276dc39ee52f43026c415c5b38085d90a&download=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}