Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-5303 Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service.
Fixes

Solution

Beckhoff recommends in their IPC Security Manual ( https://download.beckhoff.com/download/Document/ipc/industrial-pc/ipc_security_en.pdf ) to use network and software firewalls to block all network ports except the ones that are needed. Beckhoff also recommends that default passwords be changed during commissioning before connecting systems to the network. In their advisories (Advisory 2014-001: Potential misuse of several administrative services, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-001.pdf . Advisory 2014-002: ADS communication port allows password bruteforce, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-002.pdf . Advisory2014-003: Recommendation to change default passwords, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-003.pdf  which were published November 17, 2014) for these issues, Beckhoff also recommends the following mitigation solutions: * Update images to build October 22, 2014, or newer, which solve these problems by disabling the services by default. * Disable the Windows CE Remote Configuration Tool by deleting the subtree “/remoteadmin.” The configuration of the web server paths can be found in the Windows registry at the path “HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS\.” * Disable startup of CE Remote Display service (cerdisp.exe) with deleting the registry key containing the “CeRDisp.exe” [-HKEY_LOCAL_MACHINE\init\Launch90]. * Disable telnet by setting the registry key [HKEY_LOCAL_MACHINE\Services\TELNETD\Flags] to dword: 4 * Restrict ADS communication to trusted networks only.


Workaround

No workaround given by the vendor.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-04T23:12:23.266Z

Reserved: 2014-08-22T00:00:00

Link: CVE-2014-5415

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-10-05T10:59:01.280

Modified: 2025-11-05T00:15:33.743

Link: CVE-2014-5415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses