Beckhoff: DoS-Vulnerability for TwinCAT OPC UA Server and IPC Diagnostics UA Server
TwinCAT OPC UA Server and IPC Diagnostics UA Server from Beckhoff Automation are vulnerable to denial of service attacks via specially crafted OPC UA requests. Affected versions: TwinCAT OPC UA Server up to 2.3.0.12, IPC Diagnostics UA Server up to 3.1.0.1. When attacked, the OPC UA server becomes unresponsive to all clients, blocking remote diagnostics and monitoring. Real-time PLC control operations are not affected. IPC Diagnostics UA Server is pre-installed on Beckhoff IPCs; on Windows CE it is disabled by default, but on other Windows images it is enabled by default. TwinCAT OPC UA Server is pre-installed on some Beckhoff hardware and may be enabled by default.
- Network access to the OPC UA server TCP port (commonly port 4840 or 4841)
- OPC UA server (TwinCAT OPC UA Server or IPC Diagnostics UA Server) must be enabled and running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8b102bf3-db8c-4878-8726-d4baa1ea10efGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.