CVE-2020-13401
moderate-risk
Published 2020-06-02
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
Do I need to act?
!
12.9% chance of exploitation in next 30 days
EPSS score — higher than 87% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.0/10
Medium
NETWORK
/ HIGH complexity
Affected Products (5)
Affected Vendors
References (18)
Release Notes
https://docs.docker.com/engine/release-notes/
Third Party Advisory
https://security.gentoo.org/glsa/202008-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200717-0002/
Third Party Advisory
https://www.debian.org/security/2020/dsa-4716
Release Notes
https://docs.docker.com/engine/release-notes/
Third Party Advisory
https://security.gentoo.org/glsa/202008-15
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200717-0002/
Third Party Advisory
https://www.debian.org/security/2020/dsa-4716
43
/ 100
moderate-risk
Severity
19/34 · Moderate
Exploitability
12/34 · Low
Exposure
12/34 · Low