Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager
Three related vulnerabilities in Beckhoff Device Manager and associated software packages allow authenticated remote users to execute arbitrary commands with elevated privileges (CVE-2025-41726), local low-privilege users to escalate privileges and execute commands as a privileged process (CVE-2025-41727), and authenticated users to trigger out-of-bounds memory reads that leak sensitive information from device processes (CVE-2025-41728). The vulnerabilities affect .Device.Manager.XAR tcpkg package versions before 2.5.3, MDP software for TwinCAT/BSD before 1.7.0.0, and mdp-bhf for Beckhoff RT Linux before 0.0.5-1.
- Valid credentials (username/password) for remote web UI or API access
- Network access to the Beckhoff Device Manager service (typically port 443 or 8080)
- Local system access for privilege escalation variant
Patching may require device reboot — plan for process interruption
/api/v1/advisories/32f5973c-c957-48b9-87b4-5363d719e9adGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.