MEDIUM · 6.0

CVE-2020-13401

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts,...

Vulnerability Description

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.

CVSS Score

6.0

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
LOW

Affected Products

VendorProductVersions
DockerEngine< 19.03.11
FedoraprojectFedora31
DebianDebian Linux10.0
BroadcomSannav-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-13401?

CVE-2020-13401 is a vulnerability with a CVSS score of 6.0 (MEDIUM). An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts,...

How severe is CVE-2020-13401?

CVE-2020-13401 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-13401?

Check the references section above for vendor advisories and patch information. Affected products include: Docker Engine, Fedoraproject Fedora, Debian Debian Linux, Broadcom Sannav.