Browse all 3 CVE security advisories affecting Hilscher. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Hilscher develops industrial communication hardware and software, focusing on automation and IoT connectivity with protocols like PROFINET and EtherCAT. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insecure default configurations and insufficient input validation. While no major public security incidents have been widely documented, the three CVEs on record highlight potential risks in their web interfaces and firmware implementations. Their security posture appears typical for industrial hardware vendors, with vulnerabilities primarily affecting exposed network-facing components rather than core functionality.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-20988 | Hilscher rcX RTOS: Wrong handling of the UDP checksum — rcX RTOSCWE-119 | 8.6 | High | 2021-05-13 |
This page lists every published CVE security advisory associated with Hilscher. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.