// For flags

CVE-2020-12494

Beckhoff: Etherleak in TwinCAT RT network driver

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.

El controlador de red TwinCAT RT de Beckhoff para Intel 8254x y 8255x, proporciona la funcionalidad EtherCAT. El controlador implementa características en tiempo real. A excepción de las tramas Ethernet enviadas desde la funcionalidad en tiempo real, todas las demás tramas Ethernet enviadas por medio del controlador no son rellenadas si su carga útil es menor que el tamaño mínimo de trama Ethernet. En su lugar, el contenido de memoria arbitrario es transmitido dentro de los bytes de relleno de la trama. Lo más probable es que esta memoria contenga segmentos de tramas transmitidas o recibidas previamente. Mediante este método, se revela el contenido de la memoria, sin embargo, un atacante apenas puede controlar qué contenido de la memoria está afectado. Por ejemplo, la divulgación puede ser provocada con peticiones echo ICMP de pequeño tamaño enviadas al dispositivo

*Credits: Beckhoff reported this vulnerability to CERT@VDE
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-04-30 CVE Reserved
  • 2020-06-16 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-459: Incomplete Cleanup
CAPEC
References (1)
URL Tag Source
https://cert.vde.com/en-us/advisories/vde-2020-019 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Match found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_FalseMatch found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_FalseMatch found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_FalseMatch found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_FalseMatch found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_FalseMatch found for: AND_3_NODES_OR__AP_AP_HW__VULN0_True_VULN1_False_VULN2_False
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status