CVE-2020-11899
high-risk
Published 2020-06-17
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
Do I need to act?
!
33.2% chance of exploitation in next 30 days
EPSS score — higher than 67% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.4/10
Medium
ADJACENT_NETWORK
/ LOW complexity
Affected Products (4)
References (23)
Technical Description
https://cwe.mitre.org/data/definitions/125.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200625-0006/
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-t...
Third Party Advisory
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple...
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295....
Broken Link
https://www.jsof-tech.com/ripple20/
Third Party Advisory
https://www.kb.cert.org/vuls/id/257161
Mitigation
https://www.kb.cert.org/vuls/id/257161/
Product
https://www.treck.com
Technical Description
https://cwe.mitre.org/data/definitions/125.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200625-0006/
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-t...
Third Party Advisory
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple...
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295....
Broken Link
https://www.jsof-tech.com/ripple20/
Third Party Advisory
https://www.kb.cert.org/vuls/id/257161
and 3 more references
51
/ 100
high-risk
Severity
18/34 · Moderate
Exploitability
23/34 · High
Exposure
10/34 · Low