ID CVE-2020-12494
Summary Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
References
Vulnerable Configurations
  • cpe:2.3:a:beckhoff:twincat_driver:*:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat_driver:*:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:*
  • cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82547ei:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82547ei:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:-:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:-:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:2.0:build2304:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:2.0:build2304:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:2.11:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:2.11:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:2.11.0.2117:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:2.11.0.2117:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:2.11.0.2120:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:2.11.0.2120:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:build4024.0:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:build4024.0:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:build_402:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:build_402:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1:build_4024.0:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1:build_4024.0:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1.0.3500:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1.0.3500:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1.0.3512:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1.0.3512:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:*
  • cpe:2.3:a:beckhoff:twincat:3.1.0.3600:*:*:*:*:*:*:*
    cpe:2.3:a:beckhoff:twincat:3.1.0.3600:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 02-12-2021 - 19:31)
Impact:
Exploitability:
CWE CWE-459
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm https://cert.vde.com/en-us/advisories/vde-2020-019
Last major update 02-12-2021 - 19:31
Published 16-06-2020 - 14:15
Last modified 02-12-2021 - 19:31
Back to Top