Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://ftp.beckhoff.com/download/document/IndustPC/Advisory-2015-001.pdf - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/132168/Beckhoff-IPC-Diagnositcs-Authentication-Bypass.html - | |
References | () http://packetstormsecurity.com/files/134071/Beckoff-CX9020-CPU-Model-Remote-Code-Execution.html - | |
References | () http://seclists.org/fulldisclosure/2015/Jun/10 - Exploit | |
References | () http://www.securityfocus.com/bid/75042 - | |
References | () http://www.thesecurityfactory.be/permalink/beckhoff-authentication-bypass.html - Exploit |
Information
Published : 2015-06-08 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4051
Mitre link : CVE-2015-4051
CVE.ORG link : CVE-2015-4051
JSON object : View
Products Affected
beckhoff
- ipc_diagnostics
CWE
CWE-284
Improper Access Control