Beckhoff: Local authentication bypass in IPC-Diagnostics package included in TwinCAT/BSD operating system
TwinCAT/BSD-based industrial PCs and IPC Diagnostics packages contain an authentication bypass in the Beckhoff Device Manager web interface. When accessed locally, any user with shell access can bypass authentication and gain full administrative privileges over the web management interface, regardless of their local user permissions. This allows an attacker to modify system settings, disable safety features, or alter process control parameters. The Device Manager interface is enabled by default and can also be accessed remotely. The vulnerability affects IPC Diagnostics versions prior to 2.0.0.1 and TwinCAT/BSD versions prior to 14.1.2.0_153968.
- Local shell access to the TwinCAT/BSD system (either directly or via a compromised low-privilege user account)
- Physical or network access to the industrial PC running TwinCAT/BSD
- IPC Diagnostics or Device Manager web interface must be enabled (default configuration)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9fb5a063-28c6-495a-ae78-ee7fb754934bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.