Description
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-19231 | Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges. |
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-09-16T17:14:23.452Z
Reserved: 2018-02-26T00:00:00.000Z
Link: CVE-2018-7502
No data.
Status : Modified
Published: 2018-03-23T17:29:00.213
Modified: 2024-11-21T04:12:15.373
Link: CVE-2018-7502
No data.
OpenCVE Enrichment
No data.
EUVD