Project Subscriptions
| Vendors | Products |
|---|---|
|
Beckhoff
Subscribe
|
|
|
Intel
Subscribe
|
82540em
Subscribe
82540ep
Subscribe
82541ei
Subscribe
82541er
Subscribe
82541gi
Subscribe
82541pi
Subscribe
82544ei
Subscribe
82544gc
Subscribe
82545em
Subscribe
82545gm
Subscribe
82546eb
Subscribe
82546gb
Subscribe
82547ei
Subscribe
82547ei
Subscribe
82547gi
Subscribe
82557
Subscribe
82558
Subscribe
82559
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4796 | Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device. |
Solution
No solution given by the vendor.
Workaround
If no real-time communication from TwinCAT is required on the Ethernet interface, then users can alternatively re-configure them to use the Intel ® driver, which is shipped with Beckhoff images. Customers should configure a perimeter firewall to block traffic from untrusted networks to the device, especially regarding ICMP and other small ethernet frames. Beckhoff offers software patches for TwinCAT 3.1 and TwinCAT 2.11 on request. These patches will be included in the the next regular releases to the affected software versions. The advisory will be updated upon availability.
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2020-019 |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-08-04T11:56:52.090Z
Reserved: 2020-04-30T00:00:00
Link: CVE-2020-12494
No data.
Status : Modified
Published: 2020-06-16T14:15:10.977
Modified: 2024-11-21T04:59:47.893
Link: CVE-2020-12494
No data.
OpenCVE Enrichment
No data.
EUVD