VDE-2020-004
Mai 14, 2025, 3:00 nachm.
The communication between e!Cockpit and the programmable logic controller is not encrypted. The broken cryptographic algorithm allows an attacker to decode the password for the e!Cockpit communication and with this …
VDE-2019-019
Mai 14, 2025, 3:00 nachm.
In case TwinCAT is configured to use the Profinet driver, a denial of service of the controller could be reached by sending special packets to the device.
VDE-2024-052
Mai 14, 2025, 3:00 nachm.
The pathfinder TCP encapsulation service is vulnerable to a drain of open file descriptors.
VDE-2025-005
Mai 14, 2025, 3:00 nachm.
A vulnerability has been found in a cryptographic library of Infineon Technologies that is part of the firmware of the CmDongles. The exploitation of this vulnerability has been classified as …
VDE-2020-028
Mai 14, 2025, 3:00 nachm.
The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for administration, commissioning and updates. With special crafted requests it is possible to change some special parameters …
VDE-2019-002
Mai 14, 2025, 3:00 nachm.
Pepperl+Fuchs analyzed WirelessHART-Gateways in respect of a critical vulnerability within the Firmware. An attacker may exploit this vulnerability to get access to files and access restricted directories that are stored …
VDE-2020-008
Mai 14, 2025, 2:53 nachm.
The Cloud Connectivity of the WAGO PLCs is used to connect the device with the cloud services from different providers. It also supports maintenance functionality with the firmware update function …
VDE-2020-045
Mai 14, 2025, 2:53 nachm.
The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets.