An Improper Resource Locking vulnerability in the SDM component of B&R Automation Runtime versions before 6.3 and before Q4.93 may allow an unauthenticated network-based attacker to delete data causing denial of service conditions.
The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as SSLv3, TLSv1.0 and TLS1.1. An network-based attacker can exploit the flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected product clients.
An authentication weakness in the SNMP service in B&R Automation Runtime versions 2.96, 3.00, 3.01, 3.06 to 3.10, 4.00 to 4.63, 4.72 and above allows unauthenticated users to modify the configuration of B&R products via SNMP.
Buffer Overflow vulnerability in B&R Automation Runtime webserver allows an unauthenticated network-based attacker to stop the cyclic program on the device and cause a denial of service.
B&R Automation Studio Upgrade Service and B&R Technology Guarding use insufficient cryptography for communication to the upgrade and the licensing servers. A network-based attacker could exploit the vulnerability to execute arbitrary code on the products or sniff sensitive data.
Improper Input Validation vulnerability in the project upload mechanism in B&R Automation Studio version >=4.0 may allow an unauthenticated network attacker to execute code.
A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services on impacted devices.
Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication.
A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.4SP, <. 4.6.3SP, < 4.7.2 and < 4.8.1 allow authenticated users to delete arbitrary files via an exposed interface.
Improper DLL loading algorithms in B&R Automation Studio versions >=4.0 and <4.12 may allow an authenticated local attacker to execute code in the context of the product.
An Allocation of Resources Without Limits or Throttling vulnerability in the ANSL-Server component of B&R Automation Runtime versions prior to 6.5 and prior to R4.93 could be exploited by an unauthenti-cated attacker on the network to win a race condition, resulting in permanent denial-of-service (DoS) conditions on affected devices.
A missing secure communication definition and an incomplete TLS validation in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.5SP, < 4.6.4 and < 4.7.2 enable unauthenticated users to perform MITM attacks via the B&R upgrade server.
An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 enabling a remote attacker to inject formula data into a generated CSV file. The exploitation of this vulnerability requires the attacker to create a malicious link. The user would need to click on this link, after which the resulting CSV file addi-tionally needs to be manually opened.
Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session
A reflected cross-site scripting (XSS) vulnerability exists in the SVG version of System Diagnostics Manager of B&R Automation Runtime versions <= G4.93 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session.
A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Automation Runtime versions >=3.00 and <=C4.93 that enables a remote attacker to execute arbitrary JavaScript in the context of the users browser session.
A memory leak in the TFTP service in B&R Automation Runtime versions <N4.26, <N4.34, <F4.45, <E4.53, <D4.63, <A4.73 and prior could allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition.
A directory traversal vulnerability in SharpZipLib used in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x and 4.2.x allow unauthenticated users to write to certain local directories. The vulnerability is also known as zip slip.
A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automation Runtime versions before 6.4 may allow an unauthenticated network-based attacker to take over already established sessions.
Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by routing IP-based packets through the host, potentially by-passing firewall, router, or NAC filtering.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2025-3450 | CRITICAL | An Improper Resource Locking vulnerability in the SDM component of B&R Automation Runtime versions b… | › |
| CVE-2024-0323 | CRITICAL | The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as S… | › |
| CVE-2019-19108 | CRITICAL | An authentication weakness in the SNMP service in B&R Automation Runtime versions 2.96, 3.00, 3.01, … | › |
| CVE-2021-22275 | HIGH | Buffer Overflow vulnerability in B&R Automation Runtime webserver allows an unauthenticated network-… | › |
| CVE-2024-0220 | HIGH | B&R Automation Studio Upgrade Service and B&R Technology Guarding use insufficient cryptography for … | › |
| CVE-2021-22289 | HIGH | Improper Input Validation vulnerability in the project upload mechanism in B&R Automation Studio ver… | › |
| CVE-2024-8603 | HIGH | A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in … | › |
| CVE-2024-5800 | HIGH | Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Run… | › |
| CVE-2019-19100 | HIGH | A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x,… | › |
| CVE-2021-22280 | HIGH | Improper DLL loading algorithms in B&R Automation Studio versions >=4.0 and <4.12 may allow an authe… | › |
| CVE-2025-11044 | MEDIUM | An Allocation of Resources Without Limits or Throttling vulnerability in the ANSL-Server component o… | › |
| CVE-2019-19101 | MEDIUM | A missing secure communication definition and an incomplete TLS validation in the upgrade service in… | › |
| CVE-2025-11498 | MEDIUM | An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnost… | › |
| CVE-2025-3448 | MEDIUM | Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&… | › |
| CVE-2023-6028 | MEDIUM | A reflected cross-site scripting (XSS) vulnerability exists in the SVG version of System Diagnostics… | › |
| CVE-2022-4286 | MEDIUM | A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Au… | › |
| CVE-2020-11637 | MEDIUM | A memory leak in the TFTP service in B&R Automation Runtime versions <N4.26, <N4.34, <F4.45, <E4.53,… | › |
| CVE-2019-19102 | MEDIUM | A directory traversal vulnerability in SharpZipLib used in the upgrade service in B&R Automation Stu… | › |
| CVE-2025-3449 | MEDIUM | A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automat… | › |
| CVE-2024-5801 | Awaiting Analysis | Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attac… | › |