Beckhoff TwinCAT 2.0 Build2304

CPE Details

Beckhoff TwinCAT 2.0 Build2304
2.0
2019-12-13
15h24 +00:00
2019-12-13
15h24 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:beckhoff:twincat:2.0:build2304:*:*:*:*:*:*

Informations

Vendor

beckhoff

Product

twincat

Version

2.0

Update

build2304

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-12494 2020-06-16 11h28 +00:00 Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
5.3
Medium
CVE-2019-16871 2019-12-19 19h42 +00:00 Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
9.8
Critical
CVE-2019-5636 2019-11-21 19h16 +00:00 When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).
7.5
High
CVE-2011-3486 2011-09-16 12h00 +00:00 Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read.
5