TwinCAT OPC UA Server in versions up to 2.3.0.12 and IPC Diagnostics UA Server in versions up to 3.1.0.1 from Beckhoff Automation GmbH & Co. KG are vulnerable to denial of service attacks. The attacker needs to send several specifically crafted requests to the running OPC UA server. After some of these requests the OPC UA server is no longer responsive to any client. This is without effect to the real-time functionality of IPCs.
References
Link | Resource |
---|---|
https://cert.vde.com/en-us/advisories/vde-2020-051 | Third Party Advisory |
https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2021-001.pdf | Vendor Advisory |
https://cert.vde.com/en-us/advisories/vde-2020-051 | Third Party Advisory |
https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2021-001.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert.vde.com/en-us/advisories/vde-2020-051 - Third Party Advisory | |
References | () https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2021-001.pdf - Vendor Advisory |
Information
Published : 2021-05-13 14:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12526
Mitre link : CVE-2020-12526
CVE.ORG link : CVE-2020-12526
JSON object : View
Products Affected
beckhoff
- twincat_opc_ua_server
- tf6100
- ipc_diagnostics_ua_server
CWE
CWE-20
Improper Input Validation