{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:47:35.519","vulnerabilities":[{"cve":{"id":"CVE-2023-6357","sourceIdentifier":"info@cert.vde.com","published":"2023-12-05T15:15:08.983","lastModified":"2024-11-21T08:43:41.900","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A low-privileged remote attacker could exploit the vulnerability and inject additional system commands via file system libraries which could give the attacker full control of the device."},{"lang":"es","value":"Un atacante remoto con pocos privilegios podría aprovechar la vulnerabilidad e inyectar comandos adicionales del sistema a través de librerías del sistema de archivos que podrían darle al atacante el control total del dispositivo."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"DEFEF3B4-03F2-4E09-A8F2-02A0604CB8BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"B2DB55B1-CAFE-435B-8776-DB4D33ED9C98"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"7D492DB3-94BA-4F14-8119-1610AB4F95EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_arm_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"97D00DF9-EBF1-4DEC-8A49-694871643B9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"D6F207B6-5906-4B39-A5B4-A07F6D5A9BB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"7791D9E4-CEC3-4658-8E2C-8F08882CE4F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"9CADE021-8D58-4BC5-BA60-A16FE24FBA73"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"B3948946-E7B8-4D7E-8D1D-80B9E0DB47AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"7C9DF443-E965-4480-B76E-4A25CF2E714F"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*","versionEndExcluding":"4.11.0.0","matchCriteriaId":"F5FCD76E-A3F5-4E02-AD3F-B2BDE708A651"},{"vulnerable":true,"criteria":"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"3.5.19.50","matchCriteriaId":"162DB2B8-3426-43F7-848A-BE542C24619C"}]}]}],"references":[{"url":"https://https://cert.vde.com/en/advisories/VDE-2023-066","source":"info@cert.vde.com","tags":["Broken Link"]},{"url":"https://cert.vde.com/en/advisories/VDE-2023-066","source":"nvd@nist.gov","tags":["Mitigation","Third Party Advisory"]},{"url":"https://https://cert.vde.com/en/advisories/VDE-2023-066","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}