Beckhoff Twincat 3.0

CPE Details

Beckhoff Twincat 3.0
3.0
2019-08-08
12h06 +00:00
2019-08-08
12h06 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:beckhoff:twincat:3.0:*:*:*:*:*:*:*

Informations

Vendor

beckhoff

Product

twincat

Version

3.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-12494 2020-06-16 11h28 +00:00 Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
5.3
Medium
CVE-2019-16871 2019-12-19 19h42 +00:00 Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
9.8
Critical
CVE-2017-16718 2018-06-27 19h00 +00:00 Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authentication with username/password. The encryption uses a fixed key, that could be extracted by an attacker. Precondition of the exploitation of this weakness is network access at the moment a route is added.
5.9
Medium