Back to overview

TRUMPF Laser GmbH: TruControl 2.14.0 to 3.14.0 affected by recent sudo vulnerability

VDE-2021-006
Last update
05/14/2025 15:00
Published at
03/22/2021 09:59
Vendor(s)
Trumpf SE + Co. KG
External ID
VDE-2021-011
CSAF Document

Summary

TruControl laser control software from versions 2.14.0 to 3.14.0 use sudo versions affected by CVE-2021-3156. The affected sudo has a heap-based buffer overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.

Impact

To be able to exploit this vulnerability the attacker first needs to gain any kind of user access to the system.

When logged on to the system the privilege escalation vulnerability can be exploited with following possible impacts/damages to the system:

  • Data loss in the laser control
  • Standstill of production
  • Damage by change of the laser control

Safety is not affected since it is controlled by an independent electromechanical safety mechanism.

Affected Product(s)

Model no. Product name Affected versions
Hardware TruDiode TruControl 2.14.0<=3.14.0
Hardware TruDisk TruControl 2.14.0<=3.14.0
Hardware TruFiber TruControl 2.14.0<=3.14.0
Hardware TruMicro2000 TruControl 2.14.0<=3.14.0
Hardware TruMicro5000 TruControl 2.14.0<=3.14.0
Hardware TruMicro6000 TruControl 2.14.0<=3.14.0
Hardware TruMicro7000 TruControl 2.14.0<=3.14.0
Hardware TruMicro8000 TruControl 2.14.0<=3.14.0
Hardware TruMicro9000 TruControl 2.14.0<=3.14.0
Hardware redpowerDirect TruControl 2.14.0<=3.14.0

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Off-by-one Error (CWE-193)
Summary

A Denial of Service vulnerability was found in Hilscher PROFINET IO Device V3 in versions prior to V3.14.0.7. This may lead to unexpected loss of cyclic communication or interruption of acyclic communication.

References

Remediation

  • Update to TruControl version 3.16.0 or higher
  • Please contact your service partner (service.tls@trumpf.com) for instructions on how to retrieve the patch

Revision History

Version Date Summary
1 03/22/2021 09:59 initial revision
2 04/10/2025 15:00 Fixed csaf reference URL and publisher information.
3 05/14/2025 15:00 Fix: added distribution