Description
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-19231 | Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges. |
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T17:14:23.452Z
Reserved: 2018-02-26T00:00:00.000Z
Link: CVE-2018-7502
No data.
Status : Modified
Published: 2018-03-23T17:29:00.213
Modified: 2024-11-21T04:12:15.373
Link: CVE-2018-7502
No data.
OpenCVE Enrichment
No data.
EUVD