#VU36998 Use of a broken or risky cryptographic algorithm in TwinCAT - CVE-2017-16718

 

#VU36998 Use of a broken or risky cryptographic algorithm in TwinCAT - CVE-2017-16718

Published: June 27, 2018 / Updated: August 8, 2020


Vulnerability identifier: #VU36998
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-16718
CWE-ID: CWE-327
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
TwinCAT
Software vendor:
Beckhoff

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authentication with username/password. The encryption uses a fixed key, that could be extracted by an attacker. Precondition of the exploitation of this weakness is network access at the moment a route is added.


Remediation

Install update from vendor's website.

External links