CVE-2020-12494

CVSS V2 Medium 5 CVSS V3 Medium 5.3
Description
Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
Overview
  • CVE ID
  • CVE-2020-12494
  • Assigner
  • info@cert.vde.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-06-16T14:15:10
  • Last Modified Date
  • 2021-12-02T19:31:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:beckhoff:twincat_driver:*:*:*:*:*:*:*:* 1 OR 3.1.0.3603
cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:* 1 OR 3.1.0.3512
cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:* 1 OR 2.11.0.2120
cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:* 1 OR 3.1.0.3600
cpe:2.3:a:beckhoff:twincat:3.1:build_402:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:* 1 OR 3.1.0.3500
cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:* 1 OR 2.11.0.2117
cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 5.3
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://cert.vde.com/en-us/advisories/vde-2020-019 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:43:32 Added to TrackCVE
2022-12-04 18:07:40 2020-06-16T14:15Z 2020-06-16T14:15:10 CVE Published Date updated
2022-12-04 18:07:40 2021-12-02T19:31:54 CVE Modified Date updated
2022-12-04 18:07:40 Analyzed Vulnerability Status updated