Vulnerability Description
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
CVSS Score
10.0
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Treck | Tcp\/Ip | < 6.0.1.66 |
Related Weaknesses (CWE)
References
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
- https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
- https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
- https://security.netapp.com/advisory/ntap-20200625-0006/
- https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf040
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tThird Party Advisory
- https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple
- https://www.jsof-tech.com/ripple20/ExploitThird Party Advisory
- https://www.kb.cert.org/vuls/id/257161
- https://www.kb.cert.org/vuls/id/257161/MitigationThird Party AdvisoryUS Government Resource
- https://www.treck.comProductVendor Advisory
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
- https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
- https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
- https://security.netapp.com/advisory/ntap-20200625-0006/
FAQ
What is CVE-2020-11896?
CVE-2020-11896 is a vulnerability with a CVSS score of 10.0 (CRITICAL). The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
How severe is CVE-2020-11896?
CVE-2020-11896 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-11896?
Check the references section above for vendor advisories and patch information. Affected products include: Treck Tcp\/Ip.