First published: Wed Jun 27 2018(Updated: )
Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their negative effect on performance and throughput. An attacker can forge arbitrary ADS packets when legitimate ADS traffic is observable.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Beckhoff TwinCAT Extended Automation Runtime |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16726 is considered a medium severity vulnerability due to the lack of encryption in the ADS protocol used by Beckhoff TwinCAT.
To mitigate CVE-2017-16726, you should implement network segmentation and apply strict firewall rules to limit access to the affected systems.
CVE-2017-16726 affects Beckhoff TwinCAT Extended Automation Runtime and products that utilize the ADS protocol.
The risks associated with CVE-2017-16726 include unauthorized access and manipulation of industrial automation systems due to unencrypted communication.
No, ADS in CVE-2017-16726 does not support encryption, as it was designed for performance rather than security.