CVE-2020-12494 (GCVE-0-2020-12494)
Vulnerability from cvelistv5
Published
2020-06-16 13:28
Modified
2024-08-04 11:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-459 - Incomplete Cleanup
Summary
Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Beckhoff | TwinCat Driver for Intel 8254x (Tcl8254x.sys) |
Version: unspecified < Version: unspecified < Version: unspecified < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:52.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2020-019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TwinCat Driver for Intel 8254x (Tcl8254x.sys)", "vendor": "Beckhoff", "versions": [ { "lessThanOrEqual": "3.1.0.3603 for TwinCAT 3.1 4024", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "3.1.0.3512 for TwinCAT 3.1 4022", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.11.0.2120 for TwinCAT 2.11 2350", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TwinCat Driver for Intel 8255x (Tcl8255x.sys)", "vendor": "Beckhoff", "versions": [ { "lessThanOrEqual": "3.1.0.3600 for TwinCAT 3.1 4024", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "3.1.0.3500 for TwinCAT 3.1 4024", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThanOrEqual": "2.11.0.2117 for TwinCAT 2.11 2350", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Beckhoff reported this vulnerability to CERT@VDE" } ], "descriptions": [ { "lang": "en", "value": "Beckhoff\u0027s TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-459", "description": "CWE-459 Incomplete Cleanup", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-19T12:29:17", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2020-019" } ], "source": { "advisory": "VDE-2020-019", "discovery": "UNKNOWN" }, "title": "Beckhoff: Etherleak in TwinCAT RT network driver", "workarounds": [ { "lang": "en", "value": "If no real-time communication from TwinCAT is required on the Ethernet interface, then users can alternatively re-configure them to use the Intel \u00ae driver, which is shipped with Beckhoff images.\nCustomers should configure a perimeter firewall to block traffic from untrusted networks to the device, especially regarding ICMP and other small ethernet frames.\nBeckhoff offers software patches for TwinCAT 3.1 and TwinCAT 2.11 on request. These patches will be included in the the next regular releases to the affected software versions. The advisory will be updated upon availability." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "CERT@VDE", "ASSIGNER": "info@cert.vde.com", "ID": "CVE-2020-12494", "STATE": "PUBLIC", "TITLE": "Beckhoff: Etherleak in TwinCAT RT network driver" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TwinCat Driver for Intel 8254x (Tcl8254x.sys)", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.1.0.3603 for TwinCAT 3.1 4024" }, { "version_affected": "\u003c=", "version_value": "3.1.0.3512 for TwinCAT 3.1 4022" }, { "version_affected": "\u003c=", "version_value": "2.11.0.2120 for TwinCAT 2.11 2350" } ] } }, { "product_name": "TwinCat Driver for Intel 8255x (Tcl8255x.sys)", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "3.1.0.3600 for TwinCAT 3.1 4024" }, { "version_affected": "\u003c=", "version_value": "3.1.0.3500 for TwinCAT 3.1 4024" }, { "version_affected": "\u003c=", "version_value": "2.11.0.2117 for TwinCAT 2.11 2350" } ] } } ] }, "vendor_name": "Beckhoff" } ] } }, "credit": [ { "lang": "eng", "value": "Beckhoff reported this vulnerability to CERT@VDE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Beckhoff\u0027s TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-459 Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2020-019", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2020-019" } ] }, "source": { "advisory": "VDE-2020-019", "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "If no real-time communication from TwinCAT is required on the Ethernet interface, then users can alternatively re-configure them to use the Intel \u00ae driver, which is shipped with Beckhoff images.\nCustomers should configure a perimeter firewall to block traffic from untrusted networks to the device, especially regarding ICMP and other small ethernet frames.\nBeckhoff offers software patches for TwinCAT 3.1 and TwinCAT 2.11 on request. These patches will be included in the the next regular releases to the affected software versions. The advisory will be updated upon availability." } ] } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2020-12494", "datePublished": "2020-06-16T13:28:38", "dateReserved": "2020-04-30T00:00:00", "dateUpdated": "2024-08-04T11:56:52.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-12494\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2020-06-16T14:15:10.977\",\"lastModified\":\"2024-11-21T04:59:47.893\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Beckhoff\u0027s TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.\"},{\"lang\":\"es\",\"value\":\"El controlador de red TwinCAT RT de Beckhoff para Intel 8254x y 8255x, proporciona la funcionalidad EtherCAT. El controlador implementa caracter\u00edsticas en tiempo real. A excepci\u00f3n de las tramas Ethernet enviadas desde la funcionalidad en tiempo real, todas las dem\u00e1s tramas Ethernet enviadas por medio del controlador no son rellenadas si su carga \u00fatil es menor que el tama\u00f1o m\u00ednimo de trama Ethernet. En su lugar, el contenido de memoria arbitrario es transmitido dentro de los bytes de relleno de la trama. Lo m\u00e1s probable es que esta memoria contenga segmentos de tramas transmitidas o recibidas previamente. Mediante este m\u00e9todo, se revela el contenido de la memoria, sin embargo, un atacante apenas puede controlar qu\u00e9 contenido de la memoria est\u00e1 afectado. Por ejemplo, la divulgaci\u00f3n puede ser provocada con peticiones echo ICMP de peque\u00f1o tama\u00f1o enviadas al dispositivo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-459\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-459\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat_driver:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.0.3603\",\"matchCriteriaId\":\"BA181C43-953B-483C-B34E-74089B1F56E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:*\",\"matchCriteriaId\":\"833123D8-C8C4-4F0B-84E4-34149B0FFA67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C24972-C85A-4B9D-B49B-64959A3D6EA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A7B7D2-1889-4B31-A71D-6128D56A1E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5DE70-0AFB-4C98-B394-CC01ABCC05CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83789ECA-6CF4-4851-814B-8F3BA1B3C924\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB515EAE-EA1B-4095-B98E-B993DE5478E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5722E6B-39F4-4B55-B823-0168E8206685\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A17337-9AA4-440C-BBDE-6022FDAB6630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7FC2A9-9EA6-4B40-A768-E0F2E2B0BA01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7191B4EF-281A-47C9-9BD0-EC1BA936814A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955D2173-8388-4CD7-8481-05D16F499ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BF5F63-57A5-4794-A8B4-FE38A330FAE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7D6376-7FEC-43C7-AC1B-F5BB0AFACD24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD4C9C7-165D-432A-9FB1-00599AB53632\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB8DA28-02A2-4921-BC0A-B4F41CD033BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.0.3512\",\"matchCriteriaId\":\"28813786-BC07-4F45-81DD-6C82E993EBB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:3.1:build_4022:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30C25C0-DF20-4F75-B054-04CB69E4828B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C24972-C85A-4B9D-B49B-64959A3D6EA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A7B7D2-1889-4B31-A71D-6128D56A1E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5DE70-0AFB-4C98-B394-CC01ABCC05CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83789ECA-6CF4-4851-814B-8F3BA1B3C924\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB515EAE-EA1B-4095-B98E-B993DE5478E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5722E6B-39F4-4B55-B823-0168E8206685\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A17337-9AA4-440C-BBDE-6022FDAB6630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7FC2A9-9EA6-4B40-A768-E0F2E2B0BA01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7191B4EF-281A-47C9-9BD0-EC1BA936814A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955D2173-8388-4CD7-8481-05D16F499ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BF5F63-57A5-4794-A8B4-FE38A330FAE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7D6376-7FEC-43C7-AC1B-F5BB0AFACD24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127BA9B4-1AC8-4E2A-B988-A6DB74D94005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB8DA28-02A2-4921-BC0A-B4F41CD033BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.11.0.2120\",\"matchCriteriaId\":\"EDAC8A5E-E88D-446D-8259-3DE668C733BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A29D14-486E-47E4-AEBC-8F1B61AE3C96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C24972-C85A-4B9D-B49B-64959A3D6EA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82540ep:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A7B7D2-1889-4B31-A71D-6128D56A1E98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5DE70-0AFB-4C98-B394-CC01ABCC05CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541er:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83789ECA-6CF4-4851-814B-8F3BA1B3C924\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB515EAE-EA1B-4095-B98E-B993DE5478E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82541pi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5722E6B-39F4-4B55-B823-0168E8206685\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544ei:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73A17337-9AA4-440C-BBDE-6022FDAB6630\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82544gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7FC2A9-9EA6-4B40-A768-E0F2E2B0BA01\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545em:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7191B4EF-281A-47C9-9BD0-EC1BA936814A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82545gm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955D2173-8388-4CD7-8481-05D16F499ED7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546eb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BF5F63-57A5-4794-A8B4-FE38A330FAE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82546gb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7D6376-7FEC-43C7-AC1B-F5BB0AFACD24\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547ei_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127BA9B4-1AC8-4E2A-B988-A6DB74D94005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82547gi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB8DA28-02A2-4921-BC0A-B4F41CD033BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.0.3600\",\"matchCriteriaId\":\"7B2487EF-FA8E-47B7-B64E-C85074E41A5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:3.1:build_402:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEFD2024-2C25-4CF2-8594-D5FFA6F37D4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15B3AE8-CE85-4859-917F-7761D4C7E0EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF15ABE-3181-46C6-A77E-01AF0F654E11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E20AD23-1608-4BC4-A3B3-9BF6ED7975DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.0.3500\",\"matchCriteriaId\":\"34EE5CBB-16DA-4047-B91B-E0EA9A88BF06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:3.1:build_4024:*:*:*:*:*:*\",\"matchCriteriaId\":\"833123D8-C8C4-4F0B-84E4-34149B0FFA67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15B3AE8-CE85-4859-917F-7761D4C7E0EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF15ABE-3181-46C6-A77E-01AF0F654E11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E20AD23-1608-4BC4-A3B3-9BF6ED7975DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.11.0.2117\",\"matchCriteriaId\":\"E2B6E51B-FDD5-40F4-BBA7-FF2922696D5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:beckhoff:twincat:2.11:build_2350:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A29D14-486E-47E4-AEBC-8F1B61AE3C96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15B3AE8-CE85-4859-917F-7761D4C7E0EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82558:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF15ABE-3181-46C6-A77E-01AF0F654E11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:82559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E20AD23-1608-4BC4-A3B3-9BF6ED7975DC\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2020-019\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2020-019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…