Description
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.
References (4)
Scores
CVSS v3
7.8
EPSS
0.0017
EPSS Percentile
38.1%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-20
CWE-822
Status
published
Products (3)
beckhoff/twincat
2.11
beckhoff/twincat
3.1
beckhoff/twincat_c\+\+
3.1
Published
Mar 23, 2018
Tracked Since
Feb 18, 2026