Multiple Ethernet Driver Frame Padding Information Disclosure (Etherleak)

  • ATTENTION! As of November 1, 2020, you are not able to reply to threads 6 months after the thread is opened if there are more than 500 posts in the thread.
    Threads will not be locked, so posts may still be edited by their authors.
    Just start a new thread on the topic to post if you get an error message when trying to reply to a thread.


New Around Here
I ran Nessus against my Asus Router Running Merlin version 384.18 (28-June-2020)

Good news! No major Vulnerabilities. Just this one marked Low. It's an old bug disclosed back in 2003. Might be a false positive but the output did show that ICMP packets are padded with random data instead of NUL characters like they should be.

Not sure if there is anything to be done about it. Is the NIC driver a blob supplied by ASUS? Is it something we can update?

The remote host uses a network device driver that pads ethernet frames with data which vary from one packet to another, likely taken from kernel memory, system memory allocated to the device driver, or a hardware buffer on its network interface card.

Known as 'Etherleak', this information disclosure vulnerability may allow an attacker to collect sensitive information from the affected host provided he is on the same physical subnet as that host.
Contact the network device driver's vendor for a fix.
See Also


Part of the Furniture
What model router? Were you testing from inside or outside of your LAN?

Similar threads

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!