CVE-2020-12510
Summary
| CVE | CVE-2020-12510 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-11-19 18:15:00 UTC |
| Updated | 2020-12-03 16:47:00 UTC |
| Description | The default installation path of the TwinCAT XAR 3.1 software in all versions is underneath C:\TwinCAT. If the directory does not exist it and further subdirectories are created with permissions which allow every local user to modify the content. The default installation registers TcSysUI.exe for automatic execution upon log in of a user. If a less privileged user has a local account he or she can replace TcSysUI.exe. It will be executed automatically by another user during login. This is also true for users with administrative access. Consequently, a less privileged user can trick a higher privileged user into executing code he or she modified this way. By default Beckhoff’s IPCs are shipped with TwinCAT software installed this way and with just a single local user configured. Thus the vulnerability exists if further less privileged users have been added. |
Risk And Classification
Problem Types: CWE-276
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Beckhoff | Twincat Extended Automation Runtime | 3.1 | All | All | All |
| Application | Beckhoff | Twincat Extended Automation Runtime | 3.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Beckhoff: Privilege Escalation through TwinCat System Tray (TcSysUI.exe) — English (USA) | CONFIRM | cert.vde.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Ayushman Dutta reported the issue to CERT@VDE
There are currently no legacy QID mappings associated with this CVE.