CVE-2019-16871

Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*
cpe:2.3:a:beckhoff:twincat:2.0:*:*:*:*:*:*:*
cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:*
cpe:2.3:a:beckhoff:twincat:3.1:build_4024.0:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2017-001.pdf - Vendor Advisory () https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2017-001.pdf - Vendor Advisory
References () https://www.ic4.be/2019/12/18/beckhoff-cve-2019-16871/#more-648 - Exploit, Third Party Advisory () https://www.ic4.be/2019/12/18/beckhoff-cve-2019-16871/#more-648 - Exploit, Third Party Advisory

Information

Published : 2019-12-19 21:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16871

Mitre link : CVE-2019-16871

CVE.ORG link : CVE-2019-16871


JSON object : View

Products Affected

beckhoff

  • twincat
CWE
CWE-290

Authentication Bypass by Spoofing