Lucene search

K
cvelistCERTVDECVELIST:CVE-2020-12494
HistoryJun 16, 2020 - 1:28 p.m.

CVE-2020-12494 Beckhoff: Etherleak in TwinCAT RT network driver

2020-06-1613:28:38
CWE-459
CERTVDE
www.cve.org

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

Beckhoff’s TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.

CNA Affected

[
  {
    "product": "TwinCat Driver for Intel 8254x (Tcl8254x.sys)",
    "vendor": "Beckhoff",
    "versions": [
      {
        "lessThanOrEqual": "3.1.0.3603 for TwinCAT 3.1 4024",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "3.1.0.3512 for TwinCAT 3.1 4022",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "2.11.0.2120 for TwinCAT 2.11 2350",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "TwinCat Driver for Intel 8255x (Tcl8255x.sys)",
    "vendor": "Beckhoff",
    "versions": [
      {
        "lessThanOrEqual": "3.1.0.3600 for TwinCAT 3.1 4024",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "3.1.0.3500 for TwinCAT 3.1 4024",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "2.11.0.2117 for TwinCAT 2.11 2350",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.9%

Related for CVELIST:CVE-2020-12494