Rapid7 Vulnerability & Exploit Database

CVE-2020-11899: Improper Input Validation in IPv6 Component Out-of-bounds Read in Treck TCP/IP stack (Ripple20)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

CVE-2020-11899: Improper Input Validation in IPv6 Component Out-of-bounds Read in Treck TCP/IP stack (Ripple20)

Severity
5
CVSS
(AV:A/AC:L/Au:N/C:N/I:P/A:P)
Published
06/16/2020
Created
07/22/2020
Added
07/21/2020
Modified
05/03/2022

Description

The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read. It is caused by improper input validation in the IPv6 component when handling a packet sent by an unauthorized network attacker. Potential Denial of Service.

Solution(s)

  • treck-tcpip-update-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;