BECKHOFF: Null Pointer Dereference vulnerability in products with OPC UA technology
Beckhoff OPC UA server and client components contain a null pointer dereference vulnerability that can be triggered when the component connects to a malicious OPC UA server. An attacker can craft a malicious OPC UA message that crashes the component. The vulnerability is exploitable when OPC UA connections use SecurityMode=None (unencrypted) and the client connects to an untrusted or attacker-controlled server. Vulnerable components include TcOpcUaServer, TcOpcUaClient, TcOpcUaGateway (and OPC UA functionality in EK9160, IPC Diagnostic UA Server, TF2110, and TS6100 systems).
- OPC UA client configured with SecurityMode=None (unencrypted connections)
- Client must initiate connection to the attacker-controlled or compromised OPC UA server
- Network path must exist from the affected device to the malicious server (local network or reachable via service discovery like mDNS)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/08bc5b64-d1ec-463f-a9dc-4aba2aaa1873Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.