Vulnerabilities > Beckhoff
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-27 | CVE-2017-16726 | Inadequate Encryption Strength vulnerability in Beckhoff Twincat Beckhoff TwinCAT supports communication over ADS. | 6.4 |
2018-06-27 | CVE-2017-16718 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Beckhoff Twincat 3.0 Beckhoff TwinCAT 3 supports communication over ADS. | 4.3 |
2018-03-23 | CVE-2018-7502 | Improper Input Validation vulnerability in Beckhoff Twincat and Twincat C++ Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. | 7.2 |
2016-10-05 | CVE-2014-5415 | Permissions, Privileges, and Access Controls vulnerability in Beckhoff Embedded PC Images and Twincat Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service. | 9.4 |
2016-10-05 | CVE-2014-5414 | 7PK - Security Features vulnerability in Beckhoff Embedded PC Images and Twincat Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. | 9.4 |
2015-06-08 | CVE-2015-4051 | Improper Access Control vulnerability in Beckhoff IPC Diagnostics Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi. | 9.0 |
2011-09-16 | CVE-2011-3486 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Beckhoff Twincat Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read. | 5.0 |