Vulnerability Description
Triangle MicroWorks DNP3 Outstation LibrariesDNP3 Outstation .NET Protocol components and DNP3 Outstation ANSI C source code libraries are affected:3.16.00 through 3.25.01. A specially crafted message may cause a stack-based buffer overflow. Authentication is not required to exploit this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trianglemicroworks | Dnp3 Source Code Library | >= 3.16.00, <= 3.25.01 |
Related Weaknesses (CWE)
References
- https://www.us-cert.gov/ics/advisories/icsa-20-105-02Third Party AdvisoryUS Government Resource
- https://www.us-cert.gov/ics/advisories/icsa-20-105-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2020-6996?
CVE-2020-6996 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Triangle MicroWorks DNP3 Outstation LibrariesDNP3 Outstation .NET Protocol components and DNP3 Outstation ANSI C source code libraries are affected:3.16.00 through 3.25.01. A specially crafted message...
How severe is CVE-2020-6996?
CVE-2020-6996 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-6996?
Check the references section above for vendor advisories and patch information. Affected products include: Trianglemicroworks Dnp3 Source Code Library.