Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
beckhoff twincat vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-3486
Beckhoff TwinCAT 2.11.0.2004 and previous versions allows remote malicious users to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read.
Beckhoff Twincat 2.8
Beckhoff Twincat 2.10
Beckhoff Twincat 2.7
Beckhoff Twincat 2.9
Beckhoff Twincat
1 EDB exploit
9.8
CVSSv3
CVE-2019-16871
Beckhoff Embedded Windows PLCs up to and including 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an malicious user to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
Beckhoff Twincat 2.0
Beckhoff Twincat 3.1
Beckhoff Twincat
7.8
CVSSv3
CVE-2018-7502
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
Beckhoff Twincat 3.1
Beckhoff Twincat 2.11
Beckhoff Twincat C++ 3.1
5.3
CVSSv3
CVE-2020-12494
Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if the...
Beckhoff Twincat Driver
Beckhoff Twincat
7.5
CVSSv3
CVE-2019-5637
When Beckhoff TwinCAT is configured to use the Profinet driver, a denial of service of the controller could be reached by sending a malformed UDP packet to the device. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).
Beckhoff Twincat 3.1.4022.30
Beckhoff Twincat 3.1.4022.29
7.5
CVSSv3
CVE-2019-5636
When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).
Beckhoff Twincat 2.0
Beckhoff Twincat 3.1
9.1
CVSSv3
CVE-2014-5415
Beckhoff Embedded PC images prior to 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote malicious users to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service.
Beckhoff Embedded Pc Images -
Beckhoff Twincat -
9.1
CVSSv3
CVE-2014-5414
Beckhoff Embedded PC images prior to 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote malicious users to obtain access via a brute-force attack.
Beckhoff Embedded Pc Images -
Beckhoff Twincat -
9.1
CVSSv3
CVE-2017-16726
Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their negative effect on performance...
Beckhoff Twincat -
5.9
CVSSv3
CVE-2017-16718
Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authentication with username/password...
Beckhoff Twincat 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »