CVE-2020-27336
low-risk
Published 2020-12-22
An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
Do I need to act?
-
0.27% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.7/10
Low
NETWORK
/ HIGH complexity
Affected Products (1)
Ipv6
Affected Vendors
References (4)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210201-0003/
Vendor Advisory
https://treck.com/vulnerability-response-information/
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210201-0003/
Vendor Advisory
https://treck.com/vulnerability-response-information/
19
/ 100
low-risk
Severity
13/34 · Low
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal