Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12494 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
TwinCAT Client/Desktop applications / Software for system administration |
Vendor | Beckhoff |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU29534
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12494
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to TwinCAT RT network driver for Intel 8254x and 8255x does not properly construct frames if their payload is less than the minimum Ethernet frame size. As a result, arbitrary system memory contents is transmitted within in the padding bytes of the frame.
MitigationContact your vendor to obtain patches.
TwinCAT: 2.11 2305 - 3.1 4024.10
External linkshttp://cert.vde.com/en-us/advisories/vde-2020-019
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.