Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
2018-03-23T17:29:00.213
2024-11-21T04:12:15.373
Modified
CVSSv3.0: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | beckhoff | twincat | 2.11 | Yes |
Application | beckhoff | twincat | 3.1 | Yes |
Application | beckhoff | twincat_c\+\+ | 3.1 | Yes |