[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-11896Date: (C)2020-06-17   (M)2023-12-22


The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 10.0CVSS Score : 9.3
Exploit Score: 3.9Exploit Score: 8.6
Impact Score: 6.0Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: CHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
VU#257161
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
https://jsof-tech.com/vulnerability-disclosure-policy/
https://security.netapp.com/advisory/ntap-20200625-0006/
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
https://www.jsof-tech.com/ripple20/
https://www.kb.cert.org/vuls/id/257161/
https://www.treck.com

CWE    1
CWE-20

© SecPod Technologies