MEDIUM · 5.3

CVE-2020-10136

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected beha...

Vulnerability Description

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVSS Score

5.3

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
LOW

Affected Products

VendorProductVersions
CiscoNx-Os5.2\(1\)sk3\(1.1\)
CiscoNexus 1000V-
CiscoNexus 1000Ve-
CiscoNexus 3016-
CiscoNexus 3048-
CiscoNexus 3064-
CiscoNexus 3064-T-
CiscoNexus 3132Q-
CiscoNexus 3172-
CiscoNexus 5010-
CiscoNexus 5020-
CiscoNexus 5548P-
CiscoNexus 5548Up-
CiscoNexus 5596T-
CiscoNexus 5596Up-
CiscoNexus 56128P-
CiscoNexus 5624Q-
CiscoNexus 5648Q-
CiscoNexus 5672Up-
CiscoNexus 5696Q-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-10136?

CVE-2020-10136 is a vulnerability with a CVSS score of 5.3 (MEDIUM). IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected beha...

How severe is CVE-2020-10136?

CVE-2020-10136 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-10136?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Nx-Os, Cisco Nexus 1000V, Cisco Nexus 1000Ve, Cisco Nexus 3016, Cisco Nexus 3048.