cve/2020/CVE-2020-12526.md

23 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-12526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12526)
![](https://img.shields.io/static/v1?label=Product&message=IPC%20Diagnostics%20UA%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TF6100&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=TwinCAT%20OPC%20UA%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%202.3.0.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%203.1.0.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%203.3.18%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen)
### Description
TwinCAT OPC UA Server in versions up to 2.3.0.12 and IPC Diagnostics UA Server in versions up to 3.1.0.1 from Beckhoff Automation GmbH & Co. KG are vulnerable to denial of service attacks. The attacker needs to send several specifically crafted requests to the running OPC UA server. After some of these requests the OPC UA server is no longer responsive to any client. This is without effect to the real-time functionality of IPCs.
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2020-051
2024-06-09 00:33:16 +00:00
- https://cert.vde.com/en-us/advisories/vde-2020-051
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.