-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
Vulnerability Details :
CVE-2020-11896
Summary
Similar CVEs
Assigner
-
mitre
Assigner Org ID
-
8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At
-
17 Jun, 2020 | 10:21
Updated At
-
04 Aug, 2024 | 11:42
Rejected At
-
Credits
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
Vendors
-
Not available
Products
-
Metrics (CVSS)
Version
Base score
Base severity
Vector
Weaknesses
Attack Patterns
Solution/Workaround
References
Hyperlink
Resource Type
EPSS History
Score
Latest Score
-
N/A
Loading...
No data available for selected date range
Percentile
Latest Percentile
-
N/A
Loading...
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼
Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner
:
mitre
Assigner Org ID
:
8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At
:
17 Jun, 2020 | 10:21
Updated At
:
04 Aug, 2024 | 11:42
Rejected At
:
▼
CVE Numbering Authority (CNA)
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
n/a
Problem Types
Type
CWE ID
Description
text
N/A
n/a
Type:
text
CWE ID:
N/A
Description:
n/a
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://www.kb.cert.org/vuls/id/257161/
x_refsource_MISC
https://www.treck.com
x_refsource_MISC
https://jsof-tech.com/vulnerability-disclosure-policy/
x_refsource_MISC
https://www.kb.cert.org/vuls/id/257161
third-party-advisory
x_refsource_CERT-VN
https://www.jsof-tech.com/ripple20/
x_refsource_MISC
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
vendor-advisory
x_refsource_CISCO
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20200625-0006/
x_refsource_CONFIRM
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
x_refsource_CONFIRM
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
x_refsource_MISC
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
x_refsource_MISC
Hyperlink:
https://www.kb.cert.org/vuls/id/257161/
Resource:
x_refsource_MISC
Hyperlink:
https://www.treck.com
Resource:
x_refsource_MISC
Hyperlink:
https://jsof-tech.com/vulnerability-disclosure-policy/
Resource:
x_refsource_MISC
Hyperlink:
https://www.kb.cert.org/vuls/id/257161
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink:
https://www.jsof-tech.com/ripple20/
Resource:
x_refsource_MISC
Hyperlink:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink:
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
Resource:
x_refsource_CONFIRM
Hyperlink:
https://security.netapp.com/advisory/ntap-20200625-0006/
Resource:
x_refsource_CONFIRM
Hyperlink:
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
Resource:
x_refsource_CONFIRM
Hyperlink:
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
Resource:
x_refsource_MISC
Hyperlink:
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
Resource:
x_refsource_MISC
▼
Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://www.kb.cert.org/vuls/id/257161/
x_refsource_MISC
x_transferred
https://www.treck.com
x_refsource_MISC
x_transferred
https://jsof-tech.com/vulnerability-disclosure-policy/
x_refsource_MISC
x_transferred
https://www.kb.cert.org/vuls/id/257161
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.jsof-tech.com/ripple20/
x_refsource_MISC
x_transferred
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20200625-0006/
x_refsource_CONFIRM
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
x_refsource_CONFIRM
x_transferred
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
x_refsource_MISC
x_transferred
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
x_refsource_MISC
x_transferred
Hyperlink:
https://www.kb.cert.org/vuls/id/257161/
Resource:
x_refsource_MISC
x_transferred
Hyperlink:
https://www.treck.com
Resource:
x_refsource_MISC
x_transferred
Hyperlink:
https://jsof-tech.com/vulnerability-disclosure-policy/
Resource:
x_refsource_MISC
x_transferred
Hyperlink:
https://www.kb.cert.org/vuls/id/257161
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink:
https://www.jsof-tech.com/ripple20/
Resource:
x_refsource_MISC
x_transferred
Hyperlink:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink:
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink:
https://security.netapp.com/advisory/ntap-20200625-0006/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink:
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink:
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
Resource:
x_refsource_MISC
x_transferred
Hyperlink:
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼
National Vulnerability Database (NVD)
nvd.nist.gov
Source
:
cve@mitre.org
Published At
:
17 Jun, 2020 | 11:15
Updated At
:
21 Jul, 2021 | 11:39
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
N/A
Date Added:
N/A
Due Date:
N/A
Vulnerability Name:
N/A
Required Action:
N/A
Metrics
Type
Version
Base score
Base severity
Vector
Primary
3.1
10.0
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Primary
2.0
9.3
HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type:
Primary
Version:
3.1
Base score:
10.0
Base severity:
CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Type:
Primary
Version:
2.0
Base score:
9.3
Base severity:
HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches
treck
treck
>>
tcp\/ip
>>
Versions before 6.0.1.66(exclusive)
cpe:2.3:a:treck:tcp\/ip:*:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
CWE-119
Primary
nvd@nist.gov
CWE-787
Primary
nvd@nist.gov
CWE ID:
CWE-119
Type:
Primary
Source:
nvd@nist.gov
CWE ID:
CWE-787
Type:
Primary
Source:
nvd@nist.gov
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.org
N/A
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
cve@mitre.org
N/A
https://jsof-tech.com/vulnerability-disclosure-policy/
cve@mitre.org
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.org
N/A
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.org
N/A
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
cve@mitre.org
Third Party Advisory
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.org
N/A
https://www.jsof-tech.com/ripple20/
cve@mitre.org
Exploit
Third Party Advisory
https://www.kb.cert.org/vuls/id/257161
cve@mitre.org
N/A
https://www.kb.cert.org/vuls/id/257161/
cve@mitre.org
Mitigation
Third Party Advisory
US Government Resource
https://www.treck.com
cve@mitre.org
Product
Vendor Advisory
Hyperlink:
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://jsof-tech.com/vulnerability-disclosure-policy/
Source:
cve@mitre.org
Resource:
Third Party Advisory
Hyperlink:
https://security.netapp.com/advisory/ntap-20200625-0006/
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC
Source:
cve@mitre.org
Resource:
Third Party Advisory
Hyperlink:
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://www.jsof-tech.com/ripple20/
Source:
cve@mitre.org
Resource:
Exploit
Third Party Advisory
Hyperlink:
https://www.kb.cert.org/vuls/id/257161
Source:
cve@mitre.org
Resource:
N/A
Hyperlink:
https://www.kb.cert.org/vuls/id/257161/
Source:
cve@mitre.org
Resource:
Mitigation
Third Party Advisory
US Government Resource
Hyperlink:
https://www.treck.com
Source:
cve@mitre.org
Resource:
Product
Vendor Advisory
Change History
0
Information is not available yet
Similar CVEs
0
Records found
Details not found