4 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 63EXPL: 0

Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. • https://cert.vde.com/en-us/advisories/vde-2020-019 • CWE-459: Incomplete Cleanup •

CVSS: 9.8EPSS: 2%CPEs: 4EXPL: 1

Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol. Los PLC Beckhoff Embedded Windows versiones hasta 3.1.4024.0 y Beckhoff Twincat sobre las estaciones de Windows Engineering, permiten a un atacante lograr una ejecución de código remota (como SYSTEM) por medio del protocolo ADS de Beckhoff. • https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2017-001.pdf https://www.ic4.be/2019/12/18/beckhoff-cve-2019-16871/#more-648 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior). Cuando un Beckhoff TwinCAT Runtime recibe un paquete UDP con formato incorrecto, el servicio de descubrimiento de ADS se cierra. Tenga en cuenta que los dispositivos TwinCAT siguen funcionando normalmente. • https://blog.rapid7.com/2019/10/08/r7-2019-32-denial-of-service-vulnerabilities-in-beckhoff-twincat-plc-environment-fixed https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2019-004.pdf • CWE-404: Improper Resource Shutdown or Release •

CVSS: 5.0EPSS: 63%CPEs: 5EXPL: 2

Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read. Beckhoff TwinCAT 2.11.0.2004 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio a través de una petición modificada al puerto UDP 48899, lo que provoca una lectura fuera de límites. Beckhoff TwinCAT versions 2.11.0.2004 and below can be brought down by sending a crafted UDP packet to port 48899 (TCATSysSrv.exe). • https://www.exploit-db.com/exploits/17835 http://aluigi.altervista.org/adv/twincat_1-adv.txt http://osvdb.org/75495 http://securityreason.com/securityalert/8380 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-06.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/69765 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •