Vulnerabilities (CVE)

Filtered by vendor Beckhoff Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-20741 1 Beckhoff 1 Cx9020 2021-08-09 7.5 HIGH 9.8 CRITICAL
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if the credentials are incorrect.
CVE-2019-16871 1 Beckhoff 1 Twincat 2021-07-21 9.3 HIGH 9.8 CRITICAL
Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
CVE-2017-16726 1 Beckhoff 1 Twincat 2019-10-09 6.4 MEDIUM 9.1 CRITICAL
Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their negative effect on performance and throughput. An attacker can forge arbitrary ADS packets when legitimate ADS traffic is observable.
CVE-2014-5414 1 Beckhoff 2 Embedded Pc Images, Twincat 2016-11-28 9.4 HIGH 9.1 CRITICAL
Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.
CVE-2014-5415 1 Beckhoff 2 Embedded Pc Images, Twincat 2016-11-28 9.4 HIGH 9.1 CRITICAL
Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service.