Beckhoff: EtherLeak in TwinCAT RT network driver
Beckhoff TwinCAT RT network driver for Intel 8254x and 8255x processors leaks arbitrary memory content in Ethernet frame padding. When the driver sends non-real-time Ethernet frames with payloads smaller than the minimum frame size, it does not pad them with zeros; instead, uninitialized memory is transmitted in the padding bytes. This memory likely contains fragments from previously transmitted or received frames, potentially exposing configuration data, credentials, or process information. The vulnerability affects TwinCAT 2.11 and 3.1 with affected driver versions up to 2.11.0.2120, 3.1.0.3512, 3.1.0.3603 (8254x) and 2.11.0.2117, 3.1.0.3600, 3.1.0.3500 (8255x).
- Network access to the same Ethernet segment as the TwinCAT controller (ability to sniff traffic)
- TwinCAT controller using Intel 8254x or 8255x network driver sending non-real-time Ethernet frames
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9c3dc0e6-ba36-43fa-8999-71ef50e6eb44Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.