First published: Tue Aug 27 2024(Updated: )
The MPD package included in TwinCAT/BSD allows an authenticated, low-privileged local attacker to induce a Denial-of-Service (DoS) condition on the daemon and execute code in the context of user “root” via a crafted HTTP request.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Beckhoff TwinCAT | <1.2.7.0 | |
Beckhoff TwinCAT | <14.1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41176 is classified as a medium severity vulnerability due to its potential for Denial-of-Service and code execution.
To mitigate CVE-2024-41176, update the MPD package to version 1.2.7.0 or higher and ensure that the TwinCAT/BSD software is updated to version 14.1.2.0 or higher.
CVE-2024-41176 affects users of Beckhoff MPD packages prior to version 1.2.7.0 and TwinCAT/BSD versions before 14.1.2.0.
CVE-2024-41176 can be exploited by authenticated, low-privileged local attackers to induce a Denial-of-Service condition.
The impact of CVE-2024-41176 includes potential Denial-of-Service conditions and unauthorized code execution in the user 'root' context.