Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-5303 | Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service. |
Solution
Beckhoff recommends in their IPC Security Manual ( https://download.beckhoff.com/download/Document/ipc/industrial-pc/ipc_security_en.pdf ) to use network and software firewalls to block all network ports except the ones that are needed. Beckhoff also recommends that default passwords be changed during commissioning before connecting systems to the network. In their advisories (Advisory 2014-001: Potential misuse of several administrative services, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-001.pdf . Advisory 2014-002: ADS communication port allows password bruteforce, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-002.pdf . Advisory2014-003: Recommendation to change default passwords, https://download.beckhoff.com/download/document/product-security/Advisories/advisory-2014-003.pdf which were published November 17, 2014) for these issues, Beckhoff also recommends the following mitigation solutions: * Update images to build October 22, 2014, or newer, which solve these problems by disabling the services by default. * Disable the Windows CE Remote Configuration Tool by deleting the subtree “/remoteadmin.” The configuration of the web server paths can be found in the Windows registry at the path “HKEY_LOCAL_MACHINE\COMM\HTTPD\VROOTS\.” * Disable startup of CE Remote Display service (cerdisp.exe) with deleting the registry key containing the “CeRDisp.exe” [-HKEY_LOCAL_MACHINE\init\Launch90]. * Disable telnet by setting the registry key [HKEY_LOCAL_MACHINE\Services\TELNETD\Flags] to dword: 4 * Restrict ADS communication to trusted networks only.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Beckhoff Embedded PC Images and TwinCAT Components Exposed Dangerous Method or Function | |
| Weaknesses | CWE-749 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-04T23:12:23.266Z
Reserved: 2014-08-22T00:00:00
Link: CVE-2014-5415
No data.
Status : Deferred
Published: 2016-10-05T10:59:01.280
Modified: 2025-11-05T00:15:33.743
Link: CVE-2014-5415
No data.
OpenCVE Enrichment
No data.
EUVD