{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T04:49:50.923","vulnerabilities":[{"cve":{"id":"CVE-2020-12526","sourceIdentifier":"info@cert.vde.com","published":"2021-05-13T14:15:17.457","lastModified":"2024-11-21T04:59:52.260","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TwinCAT OPC UA Server in versions up to 2.3.0.12 and IPC Diagnostics UA Server in versions up to 3.1.0.1 from Beckhoff Automation GmbH & Co. KG are vulnerable to denial of service attacks. The attacker needs to send several specifically crafted requests to the running OPC UA server. After some of these requests the OPC UA server is no longer responsive to any client. This is without effect to the real-time functionality of IPCs."},{"lang":"es","value":"TwinCAT OPC UA Server en versiones hasta 2.3.0.12 e IPC Diagnostics UA Server en versiones hasta 3.1.0.1 de Beckhoff Automation GmbH &amp; Co. KG son vulnerables a ataques de denegación de servicio.&#xa0;El atacante necesita enviar varias peticiones diseñadas específicamente al servidor OPC UA en ejecución.&#xa0;Después de algunas de estas peticiones, el servidor OPC UA ya no responde a ningún cliente.&#xa0;Esto no afecta a la funcionalidad en tiempo real de los IPC"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:beckhoff:ipc_diagnostics_ua_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.1.0.1","matchCriteriaId":"F2F63E85-BE46-46AE-BED7-5D4963672BEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:beckhoff:tf6100:*:*:*:*:*:*:*:*","versionEndIncluding":"3.3.18","matchCriteriaId":"5BE81331-ED73-4B59-BE98-E064A2C32B02"},{"vulnerable":true,"criteria":"cpe:2.3:a:beckhoff:twincat_opc_ua_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.3.0.12","matchCriteriaId":"FFE1FF2F-5E28-4114-BCD5-B33B3898901E"}]}]}],"references":[{"url":"https://cert.vde.com/en-us/advisories/vde-2020-051","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2021-001.pdf","source":"info@cert.vde.com","tags":["Vendor Advisory"]},{"url":"https://cert.vde.com/en-us/advisories/vde-2020-051","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://download.beckhoff.com/download/Document/product-security/Advisories/advisory-2021-001.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}