A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cert.vde.com/en/advisories/VDE-2024-064 |
History
Thu, 31 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Beckhoff
Beckhoff twincat Packet Manager |
|
CPEs | cpe:2.3:a:beckhoff:twincat_packet_manager:*:*:*:*:*:*:*:* | |
Vendors & Products |
Beckhoff
Beckhoff twincat Packet Manager |
|
Metrics |
ssvc
|
Thu, 31 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A local user with administrative access rights can enter specialy crafted values for settings at the user interface (UI) of the TwinCAT Package Manager which then causes arbitrary OS commands to be executed. | |
Title | Beckhoff: Local command injection via TwinCAT Package Manager | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: CERTVDE
Published: 2024-10-31T12:44:44.638Z
Updated: 2024-10-31T13:47:50.093Z
Reserved: 2024-09-17T07:33:02.586Z
Link: CVE-2024-8934
Vulnrichment
Updated: 2024-10-31T13:47:38.965Z
NVD
Status : Awaiting Analysis
Published: 2024-10-31T13:15:15.040
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-8934
Redhat
No data.