First published: Tue Aug 27 2024(Updated: )
The IPC-Diagnostics package included in TwinCAT/BSD is vulnerable to a local authentication bypass by a low privileged attacker.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Beckhoff IPC Diagnostics | <2.0.0.1 | |
Beckhoff TwinCAT | <14.1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41173 is considered a high severity vulnerability due to its potential for local authentication bypass.
To mitigate CVE-2024-41173, upgrade the IPC-Diagnostics package to a version higher than 2.0.0.1 and ensure that you are using an updated version of TwinCAT/BSD beyond 14.1.2.0.
The CVE-2024-41173 vulnerability affects users of the IPC-Diagnostics package in TwinCAT/BSD, particularly those using versions up to 2.0.0.1 and 14.1.2.0 respectively.
CVE-2024-41173 can be exploited by low privileged attackers to bypass authentication processes in affected software.
As of now, public exploit code for CVE-2024-41173 has not been reported, but the vulnerability's nature poses significant risks.