Beckhoff: Stack Overflow and XXE vulnerability in various OPC UA products
Beckhoff TwinCAT OPC UA products contain stack overflow and information disclosure vulnerabilities in OPC UA protocol handling. Affected products include TwinCAT OPC UA Client System Manager Extension, Configurator (standalone and Visual Studio), Sample Client, Scope Server, and Target Browser OPC UA Extension. An attacker can send unauthenticated OPC UA protocol packets to trigger a stack overflow (causing denial of service) or force the product to disclose information. The vulnerabilities exist in multiple versions of TF6100, TS6100, TF3300, and TF6720.
- Network access to the OPC UA port (typically TCP 4840) on the affected client or server product
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/146e1f58-da19-4eb8-9641-f69acf469c53Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.