First published: Fri Mar 23 2018(Updated: )
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Beckhoff TwinCAT Extended Automation Runtime | =2.11 | |
Beckhoff TwinCAT Extended Automation Runtime | =3.1 | |
Beckhoff TwinCAT C++ | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7502 is considered to have a high severity due to the potential for an attacker to gain SYSTEM privileges.
To fix CVE-2018-7502, ensure that you update to the latest versions of Beckhoff TwinCAT software which include patches for this vulnerability.
CVE-2018-7502 affects users of Beckhoff TwinCAT versions 2.11 and 3.1, including specific builds mentioned in the vulnerability report.
CVE-2018-7502 could be exploited by attackers executing malicious code to manipulate user-supplied pointer values.
Exploiting CVE-2018-7502 could allow an attacker to escalate privileges to SYSTEM level on the affected system.