Vulnerability Name: | CVE-2020-11911 (CCN-183514) | ||||||||||||
Assigned: | 2020-06-16 | ||||||||||||
Published: | 2020-06-16 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
3.2 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-862 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-11911 Source: CONFIRM Type: UNKNOWN http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt Source: CCN Type: US-CERT VU#257161 Treck IP stacks contain multiple vulnerabilities Source: XF Type: UNKNOWN treck-cve202011911-sec-bypass(183514) Source: MISC Type: Third Party Advisory https://jsof-tech.com/vulnerability-disclosure-policy/ Source: CONFIRM Type: UNKNOWN https://security.netapp.com/advisory/ntap-20200625-0006/ Source: MISC Type: UNKNOWN https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us Source: CCN Type: Cisco Security Advisory cisco-sa-treck-ip-stack-JyBQ5GyC Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020 Source: CISCO Type: Third Party Advisory 20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020 Source: CCN Type: Treck Web site Treck TCP/IP Stack Source: MISC Type: UNKNOWN https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities Source: CCN Type: JSOF Web site 19 Zero-Day Vulnerabilities Amplified by the Supply Chain Source: MISC Type: Exploit, Third Party Advisory https://www.jsof-tech.com/ripple20/ Source: CERT-VN Type: UNKNOWN VU#257161 Source: MISC Type: Mitigation, Third Party Advisory, US Government Resource https://www.kb.cert.org/vuls/id/257161/ Source: MISC Type: Product, Vendor Advisory https://www.treck.com Source: CCN Type: ICSA-20-168-01 Treck TCP/IP Stack | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |