Vulnerability Description
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
CVSS Score
9.0
CRITICAL
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Treck | Tcp\/Ip | < 6.0.1.66 |
Related Weaknesses (CWE)
References
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
- https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tThird Party Advisory
- https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple
- https://www.jsof-tech.com/ripple20/ExploitThird Party Advisory
- https://www.kb.cert.org/vuls/id/257161
- https://www.kb.cert.org/vuls/id/257161/MitigationThird Party AdvisoryUS Government Resource
- https://www.treck.comProductVendor Advisory
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
- https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tThird Party Advisory
- https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple
- https://www.jsof-tech.com/ripple20/ExploitThird Party Advisory
- https://www.kb.cert.org/vuls/id/257161
- https://www.kb.cert.org/vuls/id/257161/MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-11901?
CVE-2020-11901 is a vulnerability with a CVSS score of 9.0 (CRITICAL). The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
How severe is CVE-2020-11901?
CVE-2020-11901 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-11901?
Check the references section above for vendor advisories and patch information. Affected products include: Treck Tcp\/Ip.