Beckhoff

Twincat

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.34%
  • Veröffentlicht 16.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:59:47

Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the dri...

Exploit
  • EPSS 5.88%
  • Veröffentlicht 19.12.2019 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:31:14

Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.

Exploit
  • EPSS 0.54%
  • Veröffentlicht 21.11.2019 20:15:15
  • Zuletzt bearbeitet 21.11.2024 04:45:16

When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 ...

  • EPSS 0.06%
  • Veröffentlicht 27.06.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:16:50

Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authent...

  • EPSS 0.07%
  • Veröffentlicht 27.06.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:16:51

Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their ...

  • EPSS 0.17%
  • Veröffentlicht 23.03.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:15

Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obta...

  • EPSS 4.19%
  • Veröffentlicht 05.10.2016 10:59:01
  • Zuletzt bearbeitet 05.11.2025 00:15:33

Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET se...

  • EPSS 5.94%
  • Veröffentlicht 05.10.2016 10:59:00
  • Zuletzt bearbeitet 05.11.2025 00:15:32

Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.

Exploit
  • EPSS 59.83%
  • Veröffentlicht 16.09.2011 14:28:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read.