Vulnerabilites related to treck - tcp\/ip
cve-2020-11905
Vulnerability from cvelistv5
Published
2020-06-17 10:43
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.675Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:11:51",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11905",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11905",
      datePublished: "2020-06-17T10:43:14",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.675Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11914
Vulnerability from cvelistv5
Published
2020-06-17 10:59
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.594Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:28:36",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11914",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11914",
      datePublished: "2020-06-17T10:59:51",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.594Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11910
Vulnerability from cvelistv5
Published
2020-06-17 10:52
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.800Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:23:04",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11910",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11910",
      datePublished: "2020-06-17T10:52:48",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.800Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11902
Vulnerability from cvelistv5
Published
2020-06-17 10:36
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.332Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:07:37",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11902",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11902",
      datePublished: "2020-06-17T10:36:19",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.332Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11911
Vulnerability from cvelistv5
Published
2020-06-17 10:55
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.872Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:23:56",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11911",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11911",
      datePublished: "2020-06-17T10:55:05",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.872Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11899
Vulnerability from cvelistv5
Published
2020-06-17 10:27
Modified
2025-02-04 19:54
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.530Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://cwe.mitre.org/data/definitions/125.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "ADJACENT_NETWORK",
                     availabilityImpact: "LOW",
                     baseScore: 5.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "NONE",
                     integrityImpact: "LOW",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2020-11899",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-04T19:52:23.602712Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2022-03-03",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-11899",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-125",
                        description: "CWE-125 Out-of-bounds Read",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-04T19:54:47.075Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-10T20:15:50.000Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://cwe.mitre.org/data/definitions/125.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11899",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cwe.mitre.org/data/definitions/125.html",
                     refsource: "MISC",
                     url: "https://cwe.mitre.org/data/definitions/125.html",
                  },
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11899",
      datePublished: "2020-06-17T10:27:59.000Z",
      dateReserved: "2020-04-19T00:00:00.000Z",
      dateUpdated: "2025-02-04T19:54:47.075Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11906
Vulnerability from cvelistv5
Published
2020-06-17 10:44
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.303Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:19:22",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11906",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11906",
      datePublished: "2020-06-17T10:44:58",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.303Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11904
Vulnerability from cvelistv5
Published
2020-06-17 10:41
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.553Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:10:30",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11904",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11904",
      datePublished: "2020-06-17T10:41:12",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.553Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11913
Vulnerability from cvelistv5
Published
2020-06-17 10:58
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.615Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:27:47",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11913",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11913",
      datePublished: "2020-06-17T10:58:24",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.615Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11908
Vulnerability from cvelistv5
Published
2020-06-17 10:49
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.840Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 4.7.1.27 mishandles '\\0' termination in DHCP.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:21:24",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11908",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 4.7.1.27 mishandles '\\0' termination in DHCP.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11908",
      datePublished: "2020-06-17T10:49:17",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.840Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11901
Vulnerability from cvelistv5
Published
2020-06-17 10:34
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.815Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:06:35",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11901",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11901",
      datePublished: "2020-06-17T10:34:01",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.815Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11903
Vulnerability from cvelistv5
Published
2020-06-17 10:37
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.759Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:09:26",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11903",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11903",
      datePublished: "2020-06-17T10:37:56",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.759Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11897
Vulnerability from cvelistv5
Published
2020-06-17 10:23
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.687Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-21T23:57:24",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11897",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11897",
      datePublished: "2020-06-17T10:23:22",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.687Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-25066
Vulnerability from cvelistv5
Published
2020-12-22 21:04
Modified
2024-08-04 15:26
Severity ?
Summary
A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T15:26:09.240Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://treck.com/vulnerability-response-information/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20210201-0003/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-02-01T16:06:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://treck.com/vulnerability-response-information/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20210201-0003/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-25066",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://treck.com/vulnerability-response-information/",
                     refsource: "CONFIRM",
                     url: "https://treck.com/vulnerability-response-information/",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20210201-0003/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20210201-0003/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-25066",
      datePublished: "2020-12-22T21:04:06",
      dateReserved: "2020-09-01T00:00:00",
      dateUpdated: "2024-08-04T15:26:09.240Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11912
Vulnerability from cvelistv5
Published
2020-06-17 10:56
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.825Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:27:02",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11912",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11912",
      datePublished: "2020-06-17T10:56:38",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.825Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-10136
Vulnerability from cvelistv5
Published
2020-06-02 08:35
Modified
2024-09-17 00:56
Severity ?
Summary
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T10:50:57.823Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#636397",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://kb.cert.org/vuls/id/636397/",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.digi.com/resources/security",
               },
               {
                  name: "VU#636397",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/636397",
               },
               {
                  name: "Security Concerns with IP Tunneling",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://datatracker.ietf.org/doc/html/rfc6169",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "RFC2003 - IP Encapsulation within IP",
               vendor: "IETF",
               versions: [
                  {
                     status: "affected",
                     version: "STD 1",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Thanks to Yannay Livneh for reporting this issue.",
            },
         ],
         datePublic: "2020-06-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-290",
                     description: "CWE-290 Authentication Bypass by Spoofing",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-06-17T21:10:04.191Z",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "VU#636397",
               url: "https://kb.cert.org/vuls/id/636397/",
            },
            {
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4",
            },
            {
               url: "https://www.digi.com/resources/security",
            },
            {
               name: "VU#636397",
               url: "https://www.kb.cert.org/vuls/id/636397",
            },
            {
               name: "Security Concerns with IP Tunneling",
               url: "https://datatracker.ietf.org/doc/html/rfc6169",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Customers should apply the latest patch provided by the affected vendor that addresses this issue and prevents unspecified IP-in-IP packets from being processed. Devices manufacturers are urged to disable IP-in-IP in their default configuration and require their customers to explicitly configure IP-in-IP as and when needed.",
            },
         ],
         source: {
            discovery: "EXTERNAL",
         },
         title: "IP-in-IP protocol allows a remote, unauthenticated attacker to route arbitrary network traffic",
         workarounds: [
            {
               lang: "en",
               value: "Users can block IP-in-IP packets by filtering IP protocol number 4. Note this filtering is for the IPv4 Protocol (or IPv6 Next Header) field value of 4 and not IP protocol version 4 (IPv4).",
            },
         ],
         x_generator: {
            engine: "cveClient/1.0.15",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2020-10136",
      datePublished: "2020-06-02T08:35:12.921954Z",
      dateReserved: "2020-03-05T00:00:00",
      dateUpdated: "2024-09-17T00:56:11.850Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11909
Vulnerability from cvelistv5
Published
2020-06-17 10:51
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.743Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:22:13",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11909",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11909",
      datePublished: "2020-06-17T10:51:09",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.743Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11907
Vulnerability from cvelistv5
Published
2020-06-17 10:47
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.826Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:20:08",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11907",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11907",
      datePublished: "2020-06-17T10:47:17",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.826Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11896
Vulnerability from cvelistv5
Published
2020-06-17 10:21
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.799Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-21T23:54:33",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11896",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11896",
      datePublished: "2020-06-17T10:21:31",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.799Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11900
Vulnerability from cvelistv5
Published
2020-06-17 10:30
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.626Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-22T00:05:32",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11900",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                     refsource: "CONFIRM",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11900",
      datePublished: "2020-06-17T10:30:24",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.626Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-11898
Vulnerability from cvelistv5
Published
2020-06-17 10:26
Modified
2024-08-04 11:42
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:42:00.831Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.treck.com",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
               },
               {
                  name: "VU#257161",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/257161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.jsof-tech.com/ripple20/",
               },
               {
                  name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-21T23:58:33",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.treck.com",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
            },
            {
               name: "VU#257161",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/257161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.jsof-tech.com/ripple20/",
            },
            {
               name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-11898",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://www.kb.cert.org/vuls/id/257161/",
                     refsource: "MISC",
                     url: "https://www.kb.cert.org/vuls/id/257161/",
                  },
                  {
                     name: "https://www.treck.com",
                     refsource: "MISC",
                     url: "https://www.treck.com",
                  },
                  {
                     name: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                     refsource: "MISC",
                     url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
                  },
                  {
                     name: "VU#257161",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/257161",
                  },
                  {
                     name: "https://www.jsof-tech.com/ripple20/",
                     refsource: "MISC",
                     url: "https://www.jsof-tech.com/ripple20/",
                  },
                  {
                     name: "20200617 Multiple Vulnerabilities in Treck IP Stack Affecting Cisco Products: June 2020",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
                  },
                  {
                     name: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                     refsource: "CONFIRM",
                     url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
                  },
                  {
                     name: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                     refsource: "MISC",
                     url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
                  },
                  {
                     name: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                     refsource: "MISC",
                     url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-11898",
      datePublished: "2020-06-17T10:26:18",
      dateReserved: "2020-04-19T00:00:00",
      dateUpdated: "2024-08-04T11:42:00.831Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, presenta un Control de Acceso de ICMPv4 Inapropiado",
      },
   ],
   id: "CVE-2020-11911",
   lastModified: "2024-11-21T04:58:53.110",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:11.100",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-732",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlNot Applicable, Third Party Advisory
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlNot Applicable, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites de DHCPv6",
      },
   ],
   id: "CVE-2020-11905",
   lastModified: "2024-11-21T04:58:52.240",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.647",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites de IPv6",
      },
   ],
   id: "CVE-2020-11913",
   lastModified: "2024-11-21T04:58:53.403",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:11.287",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "200BD4B4-2FB1-4A50-9FEF-624B9E36AFE0",
                     versionEndExcluding: "4.7.1.27",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 4.7.1.27 mishandles '\\0' termination in DHCP.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 4.7.1.27, maneja inapropiadamente la terminación \"\\0\" en DHCP",
      },
   ],
   id: "CVE-2020-11908",
   lastModified: "2024-11-21T04:58:52.683",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.897",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, permite Una ejecución de Código Remota  por medio de una respuesta DNS no válida única",
      },
   ],
   id: "CVE-2020-11901",
   lastModified: "2024-11-21T04:58:51.653",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.350",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
            {
               lang: "en",
               value: "CWE-131",
            },
            {
               lang: "en",
               value: "CWE-330",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, presenta un Subdesbordamiento de Enteros de Capa de Enlace Ethernet",
      },
   ],
   id: "CVE-2020-11906",
   lastModified: "2024-11-21T04:58:52.397",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.727",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-02 09:15
Modified
2024-11-21 04:54
Summary
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
Impacted products
Vendor Product Version
cisco nx-os 5.2\(1\)sk3\(1.1\)
cisco nx-os 5.2\(1\)sk3\(2.1\)
cisco nx-os 5.2\(1\)sk3\(2.1a\)
cisco nx-os 5.2\(1\)sk3\(2.2\)
cisco nx-os 5.2\(1\)sk3\(2.2b\)
cisco nx-os 5.2\(1\)sm1\(5.1\)
cisco nx-os 5.2\(1\)sm1\(5.2\)
cisco nx-os 5.2\(1\)sm1\(5.2a\)
cisco nx-os 5.2\(1\)sm1\(5.2b\)
cisco nx-os 5.2\(1\)sm1\(5.2c\)
cisco nx-os 5.2\(1\)sm3\(1.1\)
cisco nx-os 5.2\(1\)sm3\(1.1a\)
cisco nx-os 5.2\(1\)sm3\(1.1b\)
cisco nx-os 5.2\(1\)sm3\(1.1c\)
cisco nx-os 5.2\(1\)sm3\(2.1\)
cisco nx-os 5.2\(1\)sv3\(1.1\)
cisco nx-os 5.2\(1\)sv3\(1.2\)
cisco nx-os 5.2\(1\)sv3\(1.3\)
cisco nx-os 5.2\(1\)sv3\(1.4\)
cisco nx-os 5.2\(1\)sv3\(1.4b\)
cisco nx-os 5.2\(1\)sv3\(1.5a\)
cisco nx-os 5.2\(1\)sv3\(1.5b\)
cisco nx-os 5.2\(1\)sv3\(1.6\)
cisco nx-os 5.2\(1\)sv3\(1.10\)
cisco nx-os 5.2\(1\)sv3\(1.15\)
cisco nx-os 5.2\(1\)sv3\(2.1\)
cisco nx-os 5.2\(1\)sv3\(2.5\)
cisco nx-os 5.2\(1\)sv3\(2.8\)
cisco nx-os 5.2\(1\)sv3\(3.1\)
cisco nx-os 5.2\(1\)sv3\(3.15\)
cisco nx-os 5.2\(1\)sv3\(4.1\)
cisco nx-os 5.2\(1\)sv3\(4.1a\)
cisco nx-os 5.2\(1\)sv3\(4.1b\)
cisco nx-os 5.2\(1\)sv3\(4.1b\)
cisco nx-os 5.2\(1\)sv3\(4.1b\)
cisco nx-os 5.2\(1\)sv5\(1.1\)
cisco nx-os 5.2\(1\)sv5\(1.2\)
cisco nx-os 5.2\(1\)sv5\(1.3\)
cisco nx-os 5.2\(1\)sv5\(1.3\)
cisco nexus_1000v -
cisco nexus_1000ve -
cisco nx-os 5.0\(3\)a1\(1\)
cisco nx-os 5.0\(3\)a1\(2\)
cisco nx-os 5.0\(3\)a1\(2a\)
cisco nx-os 5.0\(3\)u1\(1\)
cisco nx-os 5.0\(3\)u1\(1a\)
cisco nx-os 5.0\(3\)u1\(1b\)
cisco nx-os 5.0\(3\)u1\(1c\)
cisco nx-os 5.0\(3\)u1\(1d\)
cisco nx-os 5.0\(3\)u1\(2\)
cisco nx-os 5.0\(3\)u1\(2a\)
cisco nx-os 5.0\(3\)u2\(1\)
cisco nx-os 5.0\(3\)u2\(2\)
cisco nx-os 5.0\(3\)u2\(2a\)
cisco nx-os 5.0\(3\)u2\(2b\)
cisco nx-os 5.0\(3\)u2\(2c\)
cisco nx-os 5.0\(3\)u2\(2d\)
cisco nx-os 5.0\(3\)u3\(1\)
cisco nx-os 5.0\(3\)u3\(2\)
cisco nx-os 5.0\(3\)u3\(2a\)
cisco nx-os 5.0\(3\)u3\(2b\)
cisco nx-os 5.0\(3\)u4\(1\)
cisco nx-os 5.0\(3\)u5\(1\)
cisco nx-os 5.0\(3\)u5\(1a\)
cisco nx-os 5.0\(3\)u5\(1b\)
cisco nx-os 5.0\(3\)u5\(1c\)
cisco nx-os 5.0\(3\)u5\(1d\)
cisco nx-os 5.0\(3\)u5\(1e\)
cisco nx-os 5.0\(3\)u5\(1f\)
cisco nx-os 5.0\(3\)u5\(1g\)
cisco nx-os 5.0\(3\)u5\(1h\)
cisco nx-os 5.0\(3\)u5\(1i\)
cisco nx-os 5.0\(3\)u5\(1j\)
cisco nx-os 6.0\(2\)a1\(1\)
cisco nx-os 6.0\(2\)a1\(1a\)
cisco nx-os 6.0\(2\)a1\(1b\)
cisco nx-os 6.0\(2\)a1\(1c\)
cisco nx-os 6.0\(2\)a1\(1d\)
cisco nx-os 6.0\(2\)a1\(1e\)
cisco nx-os 6.0\(2\)a1\(1f\)
cisco nx-os 6.0\(2\)a1\(2d\)
cisco nx-os 6.0\(2\)a3\(1\)
cisco nx-os 6.0\(2\)a3\(2\)
cisco nx-os 6.0\(2\)a3\(4\)
cisco nx-os 6.0\(2\)a4\(1\)
cisco nx-os 6.0\(2\)a4\(2\)
cisco nx-os 6.0\(2\)a4\(3\)
cisco nx-os 6.0\(2\)a4\(4\)
cisco nx-os 6.0\(2\)a4\(5\)
cisco nx-os 6.0\(2\)a4\(6\)
cisco nx-os 6.0\(2\)u1\(1\)
cisco nx-os 6.0\(2\)u1\(1a\)
cisco nx-os 6.0\(2\)u1\(2\)
cisco nx-os 6.0\(2\)u1\(3\)
cisco nx-os 6.0\(2\)u1\(4\)
cisco nx-os 6.0\(2\)u2\(1\)
cisco nx-os 6.0\(2\)u2\(2\)
cisco nx-os 6.0\(2\)u2\(3\)
cisco nx-os 6.0\(2\)u2\(4\)
cisco nx-os 6.0\(2\)u2\(4.92.4z\)
cisco nx-os 6.0\(2\)u2\(5\)
cisco nx-os 6.0\(2\)u2\(6\)
cisco nx-os 6.0\(2\)u3\(1\)
cisco nx-os 6.0\(2\)u3\(2\)
cisco nx-os 6.0\(2\)u3\(3\)
cisco nx-os 6.0\(2\)u3\(4\)
cisco nx-os 6.0\(2\)u3\(5\)
cisco nx-os 6.0\(2\)u3\(6\)
cisco nx-os 6.0\(2\)u3\(7\)
cisco nx-os 6.0\(2\)u3\(8\)
cisco nx-os 6.0\(2\)u3\(9\)
cisco nx-os 6.0\(2\)u4\(1\)
cisco nx-os 6.0\(2\)u4\(2\)
cisco nx-os 6.0\(2\)u4\(3\)
cisco nx-os 6.0\(2\)u4\(4\)
cisco nx-os 6.0\(2\)u5\(1\)
cisco nx-os 6.1\(2\)i2\(2b\)
cisco nx-os 6.1\(2\)i3\(1\)
cisco nx-os 6.1\(2\)i3\(2\)
cisco nx-os 6.1\(2\)i3\(3\)
cisco nx-os 6.1\(2\)i3\(3a\)
cisco nx-os 7.0\(3\)i1\(1\)
cisco nx-os 7.0\(3\)i1\(1a\)
cisco nx-os 7.0\(3\)i1\(1b\)
cisco nx-os 7.0\(3\)i1\(1z\)
cisco nexus_3016 -
cisco nexus_3048 -
cisco nexus_3064 -
cisco nexus_3064-t -
cisco nexus_3132q -
cisco nexus_3172 -
cisco nx-os 5.2\(1\)n1\(1\)
cisco nx-os 5.2\(1\)n1\(1a\)
cisco nx-os 5.2\(1\)n1\(1b\)
cisco nx-os 5.2\(1\)n1\(2\)
cisco nx-os 5.2\(1\)n1\(2a\)
cisco nx-os 5.2\(1\)n1\(3\)
cisco nx-os 5.2\(1\)n1\(4\)
cisco nx-os 5.2\(1\)n1\(5\)
cisco nx-os 5.2\(1\)n1\(6\)
cisco nx-os 5.2\(1\)n1\(7\)
cisco nx-os 5.2\(1\)n1\(8\)
cisco nx-os 5.2\(1\)n1\(8a\)
cisco nx-os 5.2\(1\)n1\(8b\)
cisco nx-os 5.2\(1\)n1\(9\)
cisco nx-os 5.2\(1\)n1\(9a\)
cisco nx-os 5.2\(1\)n1\(9b\)
cisco nx-os 6.0\(2\)n1\(1\)
cisco nx-os 6.0\(2\)n1\(1a\)
cisco nx-os 6.0\(2\)n1\(2\)
cisco nx-os 6.0\(2\)n1\(2a\)
cisco nx-os 6.0\(2\)n2\(1\)
cisco nx-os 6.0\(2\)n2\(1b\)
cisco nx-os 6.0\(2\)n2\(2\)
cisco nx-os 6.0\(2\)n2\(3\)
cisco nx-os 6.0\(2\)n2\(4\)
cisco nx-os 6.0\(2\)n2\(5\)
cisco nx-os 6.0\(2\)n2\(5a\)
cisco nx-os 6.0\(2\)n2\(5b\)
cisco nx-os 6.0\(2\)n2\(6\)
cisco nx-os 6.0\(2\)n2\(7\)
cisco nx-os 7.0\(0\)n1\(1\)
cisco nx-os 7.0\(1\)n1\(1\)
cisco nx-os 7.0\(2\)n1\(1\)
cisco nx-os 7.0\(3\)n1\(1\)
cisco nx-os 7.0\(4\)n1\(1\)
cisco nx-os 7.0\(4\)n1\(1a\)
cisco nx-os 7.0\(5\)n1\(1\)
cisco nx-os 7.0\(5\)n1\(1a\)
cisco nx-os 7.0\(6\)n1\(1\)
cisco nx-os 7.0\(6\)n1\(2s\)
cisco nx-os 7.0\(6\)n1\(3s\)
cisco nx-os 7.0\(6\)n1\(4s\)
cisco nx-os 7.0\(7\)n1\(1\)
cisco nx-os 7.0\(7\)n1\(1a\)
cisco nx-os 7.0\(7\)n1\(1b\)
cisco nx-os 7.0\(8\)n1\(1\)
cisco nx-os 7.0\(8\)n1\(1a\)
cisco nx-os 7.1\(0\)n1\(1\)
cisco nx-os 7.1\(0\)n1\(1a\)
cisco nx-os 7.1\(0\)n1\(1b\)
cisco nx-os 7.1\(1\)n1\(1\)
cisco nx-os 7.1\(1\)n1\(1a\)
cisco nx-os 7.1\(2\)n1\(1\)
cisco nx-os 7.1\(2\)n1\(1a\)
cisco nx-os 7.1\(3\)n1\(1\)
cisco nx-os 7.1\(3\)n1\(2\)
cisco nx-os 7.1\(3\)n1\(2a\)
cisco nx-os 7.1\(3\)n1\(3\)
cisco nx-os 7.1\(3\)n1\(4\)
cisco nx-os 7.1\(3\)n1\(5\)
cisco nx-os 7.1\(4\)n1\(1\)
cisco nx-os 7.1\(4\)n1\(1a\)
cisco nx-os 7.1\(4\)n1\(1c\)
cisco nx-os 7.1\(4\)n1\(1d\)
cisco nx-os 7.1\(5\)n1\(1\)
cisco nx-os 7.1\(5\)n1\(1b\)
cisco nx-os 7.2\(1\)n1\(1\)
cisco nx-os 7.3\(0\)n1\(1\)
cisco nx-os 7.3\(0\)n1\(1a\)
cisco nx-os 7.3\(0\)n1\(1b\)
cisco nx-os 7.3\(1\)n1\(1\)
cisco nx-os 7.3\(2\)n1\(1\)
cisco nx-os 7.3\(2\)n1\(1b\)
cisco nx-os 7.3\(2\)n1\(1c\)
cisco nx-os 7.3\(3\)n1\(1\)
cisco nx-os 7.3\(4\)n1\(1\)
cisco nx-os 7.3\(4\)n1\(1a\)
cisco nx-os 7.3\(5\)n1\(1\)
cisco nx-os 7.3\(6\)n1\(1\)
cisco nx-os 7.3\(6\)n1\(1a\)
cisco nx-os 7.3\(7\)n1\(1\)
cisco nx-os 7.3\(7\)n1\(1a\)
cisco nexus_5010 -
cisco nexus_5020 -
cisco nexus_5548p -
cisco nexus_5548up -
cisco nexus_5596t -
cisco nexus_5596up -
cisco nexus_56128p -
cisco nexus_5624q -
cisco nexus_5648q -
cisco nexus_5672up -
cisco nexus_5696q -
cisco nexus_6001 -
cisco nexus_6004 -
cisco nx-os 5.2\(1\)
cisco nx-os 5.2\(3\)
cisco nx-os 5.2\(3a\)
cisco nx-os 5.2\(4\)
cisco nx-os 5.2\(5\)
cisco nx-os 5.2\(7\)
cisco nx-os 5.2\(9\)
cisco nx-os 5.2\(9a\)
cisco nx-os 6.2\(2\)
cisco nx-os 6.2\(2a\)
cisco nx-os 6.2\(6\)
cisco nx-os 6.2\(6a\)
cisco nx-os 6.2\(6b\)
cisco nx-os 6.2\(8\)
cisco nx-os 6.2\(8a\)
cisco nx-os 6.2\(8b\)
cisco nx-os 6.2\(10\)
cisco nx-os 6.2\(12\)
cisco nx-os 6.2\(14\)
cisco nx-os 6.2\(14a\)
cisco nx-os 6.2\(14b\)
cisco nx-os 6.2\(16\)
cisco nx-os 6.2\(18\)
cisco nx-os 6.2\(20\)
cisco nx-os 6.2\(20a\)
cisco nx-os 6.2\(22\)
cisco nx-os 6.2\(24\)
cisco nx-os 7.2\(0\)d1\(1\)
cisco nx-os 7.2\(1\)d1\(1\)
cisco nx-os 7.2\(2\)d1\(1\)
cisco nx-os 7.2\(2\)d1\(2\)
cisco nx-os 7.2\(2\)d1\(3\)
cisco nx-os 7.2\(2\)d1\(4\)
cisco nx-os 7.3\(0\)d1\(1\)
cisco nx-os 7.3\(0\)dx\(1\)
cisco nx-os 7.3\(1\)d1\(1\)
cisco nx-os 7.3\(2\)d1\(1\)
cisco nx-os 7.3\(2\)d1\(1d\)
cisco nx-os 7.3\(2\)d1\(2\)
cisco nx-os 7.3\(2\)d1\(3\)
cisco nx-os 7.3\(2\)d1\(3a\)
cisco nx-os 7.3\(3\)d1\(1\)
cisco nx-os 7.3\(4\)d1\(1\)
cisco nx-os 7.3\(5\)d1\(1\)
cisco nx-os 7.3\(6\)d1\(1\)
cisco nexus_7000 -
cisco nexus_7700 -
cisco nx-os 6.1\(2\)i1\(2\)
cisco nx-os 6.1\(2\)i1\(3\)
cisco nx-os 6.1\(2\)i2\(1\)
cisco nx-os 6.1\(2\)i2\(2\)
cisco nx-os 6.1\(2\)i2\(2a\)
cisco nx-os 6.1\(2\)i2\(2b\)
cisco nx-os 6.1\(2\)i2\(3\)
cisco nx-os 6.1\(2\)i3\(1\)
cisco nx-os 6.1\(2\)i3\(2\)
cisco nx-os 6.1\(2\)i3\(3\)
cisco nx-os 6.1\(2\)i3\(3a\)
cisco nx-os 7.0\(3\)i1\(1\)
cisco nx-os 7.0\(3\)i1\(1a\)
cisco nx-os 7.0\(3\)i1\(1b\)
cisco nx-os 7.0\(3\)i1\(1z\)
cisco nexus_92304qc -
cisco nexus_92348gc-x -
cisco nexus_9236c -
cisco nexus_9272q -
cisco nexus_93108tc-ex -
cisco nexus_93108tc-fx -
cisco nexus_93120tx -
cisco nexus_93128tx -
cisco nexus_93180lc-ex -
cisco nexus_93180yc-ex -
cisco nexus_93180yc-fx -
cisco nexus_93216tc-fx2 -
cisco nexus_93240yc-fx2 -
cisco nexus_9332c -
cisco nexus_9332pq -
cisco nexus_93360yc-fx2 -
cisco nexus_9336c-fx2 -
cisco nexus_9336pq_aci_spine -
cisco nexus_9348gc-fxp -
cisco nexus_9364c -
cisco nexus_9372px -
cisco nexus_9372px-e -
cisco nexus_9372tx -
cisco nexus_9372tx-e -
cisco nexus_9396px -
cisco nexus_9396tx -
cisco nexus_9504 -
cisco nexus_9508 -
cisco nexus_9516 -
cisco ucs_manager 3.2\(3n\)a
cisco ucs_6248up -
cisco ucs_6296up -
cisco ucs_6324 -
cisco ucs_6332 -
cisco ucs_6332-16up -
digi saros *
hp x3220nr_firmware *
hp x3220nr_firmware -
treck tcp\/ip *
cisco unified_computing_system -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(1.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8AE969C2-960D-4C09-BBCA-B757D925EB5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5D85822F-209F-4FE3-8ED9-59EC33E71884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9180296D-7BF2-445E-92AB-002D50D8D87B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E0B7B63E-7B91-48BC-A0E7-5BDC1FCC02AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sk3\\(2.2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28765813-6283-43AF-9C0E-6884B305C158",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B3917B37-BA20-4B07-B003-B7E5F99C4A45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BA9CEC37-A833-41D6-B3DA-9D17962D0989",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3515BB86-5FD5-4203-B1AB-CCC8B784D091",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5F310196-08CD-4A81-BE5C-8B484A71CD6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm1\\(5.2c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8663A9-7287-4A28-8278-124F437A2BD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "36ECC59E-23AB-44F2-982E-8EC6901F6CCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A7ECE401-189C-4438-8B73-AED84EAEB2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF80603-493F-41D1-B8E1-C73617AD4992",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(1.1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7B5E826B-AD7D-417E-87F4-C702BFB243A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sm3\\(2.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4FC4D1AE-FC2D-4687-BE4A-04064CCDBBA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "95F0898B-06EC-426E-98A6-753FD1FA1250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "48E47ECE-9070-4EC6-BEB2-B6C233419439",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5264C81D-8FA2-4C83-A136-A5F2A298DB08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "675E1BB5-E0B5-4123-819F-641DB1277EC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EADE0C99-64F2-4294-A78B-782006C40F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9A58D667-218D-42DA-A15F-4DA23762A71B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.5b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A4265ACF-8EC4-4794-A31F-28CC6CBEBFE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B3BE1868-1AEB-468C-8B96-A0E85A5B7064",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "17C275C2-9082-47EC-B525-9EAA427A083B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.15\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "072DA31B-F629-4A39-9149-03CC339C8D01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3D3F90-5552-45EA-97E6-D298D23A87A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0D58CF7B-FCEF-4A97-A9D3-631556FCE3D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(2.8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "650B2C45-A7F4-4104-BF7A-7C4E18CFA225",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2F74EB97-3BC7-4CC5-A48F-57B0C4C0E108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(3.15\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE71BCEF-43A3-41C4-871B-E30DD7BFE3DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE33B6DC-0339-4D13-8AEC-7A91A386D3AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A89675-D360-4476-ADDE-FA3F0EBEC131",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFC48A4A-C4CC-4463-83D8-32192F3B7D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:hyper-v:*:*",
                     matchCriteriaId: "71AC07A2-0A94-4531-8733-C399EC926515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(4.1b\\):*:*:*:*:vsphere:*:*",
                     matchCriteriaId: "9414EB06-685B-449A-AAE0-70BF74B50F59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "14F547DC-9941-49B8-9752-FC25D144022F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A9F0C0E2-17ED-4CCB-BAFA-CD957ACC8BF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5266D0F6-9B69-43A9-BA66-C0A6C1293BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv5\\(1.3\\):*:*:*:*:vsphere:*:*",
                     matchCriteriaId: "DB787D8A-1E09-450B-A7EC-8F2C3B7A0383",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E705638-8D0A-40D6-9A51-4FDB6C03F71E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_1000ve:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "882D7344-E38B-4F44-8CDE-1CCA827F28BB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "65CDC91A-BFED-47C3-8B2E-4BEB99F73555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A58651D4-1292-445F-985F-945E2B881AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)a1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "169B0759-C366-4633-99E0-0FCF8CBBB002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "92BDA5ED-E9AF-4D9C-9D13-BADFC515670C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F358E8D0-624B-412A-8726-B8AF96156317",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B178F96C-78D0-466E-B201-FE5371F4610E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "17A4CE07-64FF-4C5C-81FF-A2388818CF7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AFDC9595-39D4-4BF8-AF18-D27A500C9007",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "171160E9-F6B8-4C8A-B086-431E3E2A27BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9CAFAE6E-8B64-4A1F-A7E4-2D4BDFB7D5B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "91C35886-CB9B-4477-9AB3-9F1C9E45E757",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7F393BE8-8CC4-4302-829F-2C4F97BAC14B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE855B3E-B2B8-4EBA-8303-55F6A5A77E79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "641D651A-B85B-4E9E-BE92-35AFAE8A63A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7810F6FD-F58F-4121-9D30-8C5E3E163EFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "09C38DCD-2A5F-4095-ABA4-02E95D93C358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "103A4C19-0E91-45FC-9AA2-F40215FCF63B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7F61C03B-D7AB-468A-B092-158730FB3E0B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7F883AA8-CC44-4440-AB30-D7AC29C242F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7390B4D2-2121-4311-A798-337E8B777A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "924C6663-9EA0-4124-ACC6-0AFC649AEA6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3C559C83-FB34-4B1A-A6B3-1834D6CD022C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7F422D53-4FF4-43FB-8F62-D53393A8C038",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7CFFFE88-17EA-4515-BF71-C0AB82957B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1f\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6EF14E5C-B776-4A04-A5CC-853CFF2816B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1g\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EF7E681A-F354-4093-84A9-5A357EAB1559",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1h\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8B627C66-CFE1-40B9-8264-392BB091EA52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1i\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "512B7DAC-3929-4063-9AA4-0C6B1E3047A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1j\\):-:*:*:*:*:*:*",
                     matchCriteriaId: "E51725F9-753E-4D03-B132-38EB0A00BC3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CA76DC9B-8325-4BF6-B729-FA781E88E7AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "26BC5100-7F5D-4603-A313-00767C6DA96F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A2EA595C-6A01-4D8D-9CB9-F280D540D3FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "882CE57A-B06D-4E93-A181-B74017ABBCC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "60848441-E3E5-47E8-809B-0B226658425E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1e\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3A196373-F643-4D7E-8DC7-8FFD60660B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(1f\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "090903C2-4B6A-4DE5-9AD6-76A412E81A92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a1\\(2d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7AF52EFA-7DE0-4669-ABA9-596D7D9A23AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AF658ED7-F77C-405B-B06A-74B46FBDAD98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4F0FDDF2-912C-4900-B0B7-20AF5D2F1B52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7295EC54-FA19-4658-8510-3C072804D9E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B31E39D5-147B-4965-ACB6-34F1244143F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3D672928-6AE8-488B-A2A5-257074BAB2D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C928C35-4E24-4DBE-ADEA-D449B88ECB6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E64D8992-CA79-4ADF-BF3B-A76E944EC740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "11A35378-54EB-422F-B0DD-211B214803D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1E46D326-665C-4DB7-89A0-0F1B987D4A18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFA21F2-E2B2-49B6-9956-D6219D499F7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "52899164-992D-4736-B460-FDFB825DB7A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8766DA4C-A25C-48D4-A6FC-2357200A9215",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B6C48105-F73E-40C9-8CD9-B46C5319FB5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "94F5B47A-023B-4415-8DB9-6829C5E72901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "618861BD-8FEE-4EF8-BFFB-A5BCBA8EA3EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6459DD6B-6DC1-4C14-A8E7-4503ED5F69BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DA600413-FC70-4776-99DF-180C96D4FD24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "ECC9066F-3082-48A0-BA52-9ED9420EA47A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4.92.4z\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AF23DA92-A5C0-488B-806E-8549190A08B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "78611E25-E33E-4C88-A681-97B5A2A01B51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "780B04ED-412E-441F-8717-D8F9257F5699",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FC6A3647-2AF0-4D45-BCC9-24618B43ACBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AD2AABBD-8680-4615-A4E2-B607CB1B0979",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "693F444B-FA34-489C-BB45-E9185DE47816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "13669043-3F12-4439-812F-6DE35F70B159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "58A8BDE0-2F73-4E0C-B73A-918DB3352067",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC4DC15-3045-4CE3-A7B5-4E6ED35BF51F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "625BE6B1-12A7-4A8A-A816-E82C026E0457",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4EAC2920-462B-44F0-8E93-7875C2F74592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "35957A41-D8F2-4BC1-986B-C3E271327D64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "10BFAE68-01C5-4EF8-8B86-F470092E9034",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6D02FC11-EB21-45CD-A070-89C4862240BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8C67AE59-380A-402B-9B2A-F595E001637B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4301927C-7A6D-4DA9-9470-9182E7FB234A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C71ED401-6786-4AAE-A98F-BE4732256A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9ED50316-7044-4757-9C51-5543BA5693A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "69B757AE-83C8-4194-9BAE-DBECA2021597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EB1A44C9-147B-4D1F-AB98-EB4F9F8C1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "702EF8D5-1F3F-45EF-AC8D-BD5A9E46A78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "30AE9092-DCF1-472F-B26D-E5BAA8DF25DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "58BC9769-F3CD-4047-8C86-8C09FB2AB0F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4C775E53-781D-4426-A59B-DB65D697A844",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "619DEAAE-3356-4079-8CC8-F477FCA18199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3DFE4CA5-42CC-4D81-B044-2D4EDFA37AA7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "528ED62B-D739-4E06-AC64-B506FD73BBAB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C10D85-88AC-4A79-8866-BED88A0F8DF8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3DBBFE9-835C-4411-8492-6006E74BAC65",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7817F4E6-B2DA-4F06-95A4-AF329F594C02",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "757A0C8E-4817-41DD-A609-2B61C36DBBCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3AECFED5-8D06-4396-BDD2-AAA0F5241839",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "772A297E-E323-4D2D-9129-6C4FC63643DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "149ABB41-A8FF-4A8F-888E-F27BDAAE9C0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6918EB91-679A-4F47-BB9E-3A22287F14FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A0464AAE-73CF-4B24-A5CE-5C1131909CF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "68376361-C835-4552-8490-553C9A082615",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "270620E3-92B7-4914-88C7-9D955B2B856E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A8E48600-FD20-4743-A3E8-AD5297164551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4A10C1B6-616E-4F94-8889-9C99906326D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "01A091A5-2848-4901-B193-1EC9DD8A52E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "380FEA27-D68C-48DA-B2B9-4A3B3A71B059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(8b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3EAF9D9A-BFA7-43B2-BCF5-D4AE884AFB44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "31224B4A-CE5F-4B6E-8BAD-DF5BAA7EEB78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64B9F42-0779-439F-ABF9-4183B9A10D88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)n1\\(9b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "704B6AA4-D001-45B6-9E84-10F7E70CD9DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C871A419-B769-46B2-956E-467BBE94F290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1AB525D6-6E1B-4806-A981-F0FEA87E516B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7EACF481-3E4B-4580-8AE7-3D49790E0715",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "698ABD3F-C9DE-4376-B57A-D05AEDCD9A25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5010EDAE-67BB-4E23-B0F5-10096A7DAB54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "84CF5114-731F-4BF4-83E0-9B095C34541C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4750621F-E7C5-4E6A-BC5F-232E75A454E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "08F35A63-9343-47D6-AB91-37AB148137E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CADBDD1D-DA17-40EE-8B23-81E9991387DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A623F8E1-B97B-41DD-947F-7E1B65DD6902",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4F3D9588-D98A-45FC-8344-58C55F35610E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(5b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "90C2E584-4BA6-48E7-8C56-A7F7D9BABC93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4A190D0A-B758-49BA-9830-9870F699DA0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EF5613C4-6D05-4CF3-931F-F685150494DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD613D8F-099C-43A1-BD29-A98250E1334A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "576B74DF-9527-4931-B1A3-8FEE1DB1AD99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5B4FA9-E550-4C69-A4E7-A989BBCCF22E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "63949081-E2F3-4EB4-BABC-270AAB19EE78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "58292522-F486-410D-AD99-DFD6EC0AA9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A462729A-720F-4180-96DD-713A70CEF494",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BEB59A4B-3FCA-47F9-A4DB-D2B8ABAFB54D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(5\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A07ACF87-C694-41DB-B4BD-23CE72E32EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C83C312B-0B0E-4A02-A9EE-F864EFBE60CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(2s\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "832DE1DB-0D1C-4C24-8E2D-D182205C94B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(3s\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BD36EDD5-4408-4BD0-A75A-AFFD5BF44D38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(6\\)n1\\(4s\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D0FBFB9B-703D-42F8-93BA-969AB7284106",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E47E0A4D-4033-43A8-9A50-E1A2BD7B419C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4C95519E-7536-4EF7-8222-D4089500F826",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "71F56568-57E6-4C1C-AC8A-D96E097E449E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F631EAC6-1D33-485E-9E00-8572FA015C26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(8\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "25CEAE9E-DD9B-41E2-BC39-3332F428B489",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DE199525-4C2D-48C2-A76C-BD14BF2851F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E3644F66-F964-4D50-A6E0-EE8784490BD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "72AD166D-7CBF-4A4D-A376-907DDA1BB504",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9A20D72B-E2C6-47B6-A54D-FA435F29D7F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6C801D4A-E604-49CA-8D14-13622E85C563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "77D9EEFA-D652-45D2-8AF5-8A72825E7ED0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC78BEB7-47D1-4544-BC40-AB5D73B93D78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1AEB91EC-E548-4C53-920F-C4871BC464B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0282F963-2C1F-44F7-A0D0-4929685051AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F519D0-64BC-4862-8894-4F6C248253C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "94A247A8-E918-4757-9ADE-251B027CD307",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "195CD630-4949-4B52-B9FF-94F3DEFB47AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "225E5070-B635-4752-B771-0E721C96C2AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9103A92E-C9F3-401B-AE30-66466210ADED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E5CD729-234E-43C0-A6A3-A3E0983A6605",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4A30E576-56F8-4EBA-AADE-C70655DE6E79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "74415A0A-A3F4-43BB-B609-B6641771D655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B5ED7424-EB12-4C21-97C8-082156716C9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "16359104-2DB6-41D6-97A8-8CA1C3AB5688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "94AA886F-7BD1-4699-B1D3-E495EFCA2812",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "569B3CE7-CA06-4636-8043-7ED7635195A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41A683FE-68AF-43E4-B846-2E82ACDD5E4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2C8B149C-D842-496A-BE21-41920F95139C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D72F0B8-D229-4995-A053-62FA6591DCBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D8025943-EA09-47E6-9109-7DAF078F8F26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A727000-44CC-461C-A7D6-0B9A99CB974A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "105B6601-D756-4B76-9554-5B6E027A5E8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0EE35B51-2D13-4A8B-BFF5-0596DBDCD261",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "69FE85C9-A0AC-4FD4-A6EE-F0868B69503B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9B1340D1-8EE8-484F-979A-AB9E34D35EB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AF1257BF-D534-4899-937F-DCBD033A7D94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "86E5CF27-5661-41DF-B339-740718760AC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE0D110-D8D7-4D50-A599-618A5120EDD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9ACD2D0D-7A38-4FCD-9E24-5588BACF8DA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "586E9024-C983-4CFF-9A3F-A39256E09910",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA7F5823-41A8-47C8-A154-02C6C31EF76A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5519EA9-1236-4F51-9974-E3FC1B26B5D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1766443C-1C5A-486E-A36F-D3045F364D78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABB6E612-4246-4408-B3F6-B31E771F5ACB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CBD3CD0-B542-4B23-9C9D-061643BE44E8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A22A2647-A4C0-4681-BBC5-D95ADBAA0457",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F557E38-09F6-42C6-BABA-3C3168B38BBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):-:*:*:*:*:*:*",
                     matchCriteriaId: "1D901758-5416-422A-A745-89EF53C5ADF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BB17004B-E1FE-4BE6-89A3-43AC2D967000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C628947-4A0E-4904-A6F7-745C3370A8F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "356B4143-5184-491B-9D10-19D6536366CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C038896F-6DBC-4695-9DBE-A60F6C39AFFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9F2453F2-704F-48F7-8009-991BE0B49251",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E00B4AC8-1D27-4394-AF28-10785AEFC073",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:5.2\\(9a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7AA95379-A172-4262-8B34-A912E47BFB2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDE8EF9-47CF-451D-9570-3D369D74D44F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "55A760CE-5E63-4A6B-8DA3-A473BC3900E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0E738E86-B75F-48BF-9E76-C7DD470F3688",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "11E66F3E-9482-4F30-8480-F036F3C68B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "68C6090F-0B05-46F0-8A67-928FE1C36D5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FBD345BD-83EF-4913-A0F3-74E52AD76BBA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "46B2B97B-DDB7-4208-BF1A-D10C8A075A14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "317C8BE8-84DA-43D5-AE93-7E7DCDE6883E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "ED7B1216-4C4F-4A23-9474-23876649ABF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "57892CBB-8C95-4E56-90F8-B77BBBDC03FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A555382D-9D35-4931-B3B0-DD4D956AB7AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(14a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "65CCE422-71DB-4500-AC91-9FB4DD5924A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(14b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C37B944B-CFB6-41F6-B4ED-049BEB3732E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "985752BE-AC65-47BC-97F5-36C2E44E55D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BEC60C3C-8689-47EC-B944-F0FB9D38E4F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6A61F7E-9929-48F5-85BA-72E744AF30B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DA24A851-F051-41A8-A33E-7296AD199306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "52E6911E-3DD8-4FCC-A1B5-613098B25337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FEA235F0-95C4-471A-BBD6-EDB723E6E7CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6BF973CD-3315-4D86-8F89-05DC97C736AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C18A0045-87F3-4782-81C5-0BF615EA9346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2768DEF1-3DFA-4683-9D8D-C5915D8E7365",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3CD05045-E867-4B7E-ACE4-7B6EA69971AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FF9B10D1-29C0-4B16-813A-B535C4C64E47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "84551391-3A13-42EC-855F-FBB3453F65D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7FD733DD-EC40-48EC-A8A6-AE09657EEFC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "18CE33FF-6C81-4B38-8C47-6DEBD4D4223C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7B0A8C-ED8F-411C-843F-B801CBBBB6C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FADC755B-3AB3-43D6-8495-1FABCBD548E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "42D84BD8-D76B-422E-9E46-4A667A981FAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "03607526-7F9E-43F5-94ED-3ED0B4D29DF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8890C4B8-2E5C-46D6-80DE-6B5256FA1CAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2F8A3FFE-D017-43F7-B481-AF25B8B2BE6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "98FC292D-27D3-40CF-98C5-AF47686FC134",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0C23B353-3500-4FA4-90CE-624A29B1048F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "29002523-6405-4198-A5E5-630A4B661767",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)d1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EF0DFA7E-9B40-4E82-9EB9-886C79B2D61C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CD1CA5A5-703E-46B1-A4C8-EF8FAD58049E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "48889960-437F-4848-9D91-DF8BAA118C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB0F49B-85C0-4C52-82E0-C2683D43B553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9ABB647D-B91E-4C2F-9FBE-1C9AAB27E2D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "384B7337-1C2F-479E-BB2B-F31320D82EE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9ED50316-7044-4757-9C51-5543BA5693A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1CB11917-C606-4025-A91A-596F7D47A311",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "69B757AE-83C8-4194-9BAE-DBECA2021597",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EB1A44C9-147B-4D1F-AB98-EB4F9F8C1C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "702EF8D5-1F3F-45EF-AC8D-BD5A9E46A78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "30AE9092-DCF1-472F-B26D-E5BAA8DF25DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "58BC9769-F3CD-4047-8C86-8C09FB2AB0F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4C775E53-781D-4426-A59B-DB65D697A844",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "619DEAAE-3356-4079-8CC8-F477FCA18199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i1\\(1z\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3DFE4CA5-42CC-4D81-B044-2D4EDFA37AA7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B2E4C1-2627-4B9D-8E92-4B483F647651",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "557ED31C-C26A-4FAE-8B14-D06B49F7F08B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11411BFD-3F4D-4309-AB35-A3629A360FB0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E663DE91-C86D-48DC-B771-FA72A8DF7A7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90184B3-C82F-4CE5-B2AD-97D5E4690871",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07DE6F63-2C7D-415B-8C34-01EC05C062F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F423E45D-A6DD-4305-9C6A-EAB26293E53A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E952A96A-0F48-4357-B7DD-1127D8827650",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F70D81F1-8B12-4474-9060-B4934D8A3873",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7349D69B-D8FA-4462-AA28-69DD18A652D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91231DC6-2773-4238-8C14-A346F213B5E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF88547-BAF4-47B0-9F60-80A30297FCEB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "113772B6-E9D2-4094-9468-3F4E1A87D07D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C45A38D6-BED6-4FEF-AD87-A1E813695DE0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1FC2B1F-232E-4754-8076-CC82F3648730",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "785FD17C-F32E-4042-9DDE-A89B3AAE0334",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63842B25-8C32-4988-BBBD-61E9CB09B4F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4364ADB9-8162-451D-806A-B98924E6B2CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B53BCB42-ED61-4FCF-8068-CB467631C63C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49E0371B-FDE2-473C-AA59-47E1269D050F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "489D11EC-5A18-4F32-BC7C-AC1FCEC27222",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BC5293E-F2B4-46DC-85DA-167EA323FCFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA022E77-6557-4A33-9A3A-D028E2DB669A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "768BE390-5ED5-48A7-9E80-C4DE8BA979B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E02DC82-0D26-436F-BA64-73C958932B0A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:ucs_manager:3.2\\(3n\\)a:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FF5911-F491-4741-8602-31CB00884520",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49112D3F-DFAD-4E71-992B-9E0640FA388C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B82093C6-B36D-4E4E-AD7F-8C107646B8D9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E406DDCE-6753-43E9-B6F0-7A038DE84E41",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "054D8EB2-97A3-4725-9DFF-27A4D231D90A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:digi:saros:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98B5C59-8AF6-448B-AB76-BB3FAA7D4DD6",
                     versionEndExcluding: "8.1.0.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:x3220nr_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A230831D-5238-49D4-9137-AB51BA84FEE5",
                     versionEndExcluding: "3.00.11.08",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:x3220nr_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "778ED36E-19A5-4BB7-A0C2-D7695DCC84C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "197CE9E4-02C7-4C1F-87D2-DFD6FF636DF2",
                     versionEndExcluding: "6.0.1.67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B944AB06-2598-431A-B6A6-0C108EBDCD5C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.",
      },
      {
         lang: "es",
         value: "Múltiples productos que implementan la IP Encapsulation dentro del estándar IP (RFC 2003, STD 1) desencapsulan y enrutan el tráfico IP-in-IP sin ninguna comprobación, lo que podría permitir a un atacante remoto no autenticado enrutar tráfico arbitrario por medio de una interfaz de red expuesta y conllevar a una falsificación, omisión de control de acceso y otros comportamientos inesperados de la red.",
      },
   ],
   id: "CVE-2020-10136",
   lastModified: "2024-11-21T04:54:53.377",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-02T09:15:09.967",
   references: [
      {
         source: "cret@cert.org",
         url: "https://datatracker.ietf.org/doc/html/rfc6169",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://kb.cert.org/vuls/id/636397/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.digi.com/resources/security",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/636397",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://datatracker.ietf.org/doc/html/rfc6169",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://kb.cert.org/vuls/id/636397/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.digi.com/resources/security",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/636397",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-290",
            },
         ],
         source: "cret@cert.org",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-290",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2025-03-14 17:27
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txtThird Party Advisory
cve@mitre.orghttps://cwe.mitre.org/data/definitions/125.htmlTechnical Description
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/Third Party Advisory
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilitiesThird Party Advisory
cve@mitre.orghttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlThird Party Advisory
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cwe.mitre.org/data/definitions/125.htmlTechnical Description
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilitiesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory



{
   cisaActionDue: "2022-03-17",
   cisaExploitAdd: "2022-03-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Treck TCP/IP stack Out-of-Bounds Read Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:dell:wyse_5050_all-in-one_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB990439-8D74-4993-AD30-C7A365C96941",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:dell:wyse_5050_all-in-one:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6966C461-DAFF-4F71-A209-44FA1BDD6AF9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:dell:wyse_7030_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B12D74A6-D734-41D6-A998-1AF09360BC7B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:dell:wyse_7030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABAFD47A-32BA-4C10-9BC3-D11A4FA57DBB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:dell:wyse_5030_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB1C2400-6395-4495-AE4E-2CFC87EE98F1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:dell:wyse_5030:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6733903C-B9D3-4476-AE6C-B224AE5BF01B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites",
      },
   ],
   id: "CVE-2020-11899",
   lastModified: "2025-03-14T17:27:28.347",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.8,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.210",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Technical Description",
         ],
         url: "https://cwe.mitre.org/data/definitions/125.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Technical Description",
         ],
         url: "https://cwe.mitre.org/data/definitions/125.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites de ARP",
      },
   ],
   id: "CVE-2020-11914",
   lastModified: "2024-11-21T04:58:53.547",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:11.367",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites de TCP",
      },
   ],
   id: "CVE-2020-11912",
   lastModified: "2024-11-21T04:58:53.260",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.3,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:11.193",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an Integer Overflow during Memory Allocation that causes an Out-of-Bounds Write.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, presenta un Desbordamiento de Enteros durante la Asignación de Memoria que causa una Escritura Fuera de Límites",
      },
   ],
   id: "CVE-2020-11904",
   lastModified: "2024-11-21T04:58:52.100",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.587",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlNot Applicable, Third Party Advisory
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.htmlNot Applicable, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBF6A8EE-5917-4C32-9BDF-ABAA3A8C22CA",
                     versionEndExcluding: "6.0.1.41",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.41 has an IPv4 tunneling Double Free.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.41, presenta una Doble Liberación al hacer un túnel IPv4",
      },
   ],
   id: "CVE-2020-11900",
   lastModified: "2024-11-21T04:58:51.510",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.273",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Third Party Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-415",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5A61BE2-20C5-41A0-A192-4099F4DD0A03",
                     versionEndExcluding: "6.0.1.28",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.28, presenta una Lectura Fuera de Límites de DHCP",
      },
   ],
   id: "CVE-2020-11903",
   lastModified: "2024-11-21T04:58:51.953",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.507",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an ICMPv4 Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de Límites de ICMPv4",
      },
   ],
   id: "CVE-2020-11910",
   lastModified: "2024-11-21T04:58:52.967",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:11.023",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Mitigation, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Mitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv6OverIPv4 tunneling Out-of-bounds Read.",
      },
      {
         lang: "es",
         value: "La pila de Treck TCP/IP versiones anteriores a 6.0.1.66, presenta una Lectura Fuera de límites al hacer un túnel IPv6OverIPv4",
      },
   ],
   id: "CVE-2020-11902",
   lastModified: "2024-11-21T04:58:51.803",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.430",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Mitigation",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mitigation",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-125",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote attackers to trigger an information leak.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, maneja inapropiadamente una Inconsistencia del Parámetro de Longitud de IPv4/ICMPv4, lo que podría permitir a atacantes remotos desencadenar una filtración de información",
      },
   ],
   id: "CVE-2020-11898",
   lastModified: "2024-11-21T04:58:51.197",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.147",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, permite una Ejecución de Código Remota, relacionada con el túnel IPv4",
      },
   ],
   id: "CVE-2020-11896",
   lastModified: "2024-11-21T04:58:50.880",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:09.990",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-12-22 22:15
Modified
2024-11-21 05:17
Summary
A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FA56F40-D050-4E68-91FB-EA23D524543E",
                     versionEndExcluding: "6.0.1.68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A heap-based buffer overflow in the Treck HTTP Server component before 6.0.1.68 allows remote attackers to cause a denial of service (crash/reset) or to possibly execute arbitrary code.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de búfer en la región heap de la memoria en el componente Treck HTTP Server versiones anteriores a 6.0.1.68, permite a atacantes remotos causar una denegación de servicio (bloqueo/reinicio) o posiblemente ejecutar código arbitrario",
      },
   ],
   id: "CVE-2020-25066",
   lastModified: "2024-11-21T05:17:09.820",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "cve@mitre.org",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-12-22T22:15:13.833",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210201-0003/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://treck.com/vulnerability-response-information/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20210201-0003/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://treck.com/vulnerability-response-information/",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Severity ?
Summary
The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEE2C313-EAE1-4269-9607-0DAD1711C434",
                     versionEndExcluding: "5.0.1.35",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 5.0.1.35, presenta una Escritura Fuera de Límites por medio de múltiples paquetes IPv6 malformados",
      },
   ],
   id: "CVE-2020-11897",
   lastModified: "2024-11-21T04:58:51.057",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.087",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, maneja inapropiadamente una Inconsistencia de Parámetro de Longitud en TCP",
      },
   ],
   id: "CVE-2020-11907",
   lastModified: "2024-11-21T04:58:52.540",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.820",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-17 11:15
Modified
2024-11-21 04:58
Summary
The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.
References
cve@mitre.orghttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
cve@mitre.orghttps://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200625-0006/
cve@mitre.orghttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
cve@mitre.orghttps://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
cve@mitre.orghttps://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161
cve@mitre.orghttps://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
cve@mitre.orghttps://www.treck.comProduct, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt
af854a3a-2127-422b-91ae-364da2661108https://jsof-tech.com/vulnerability-disclosure-policy/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200625-0006/
af854a3a-2127-422b-91ae-364da2661108https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyCThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
af854a3a-2127-422b-91ae-364da2661108https://www.jsof-tech.com/ripple20/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/257161/Mitigation, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.treck.comProduct, Vendor Advisory
Impacted products
Vendor Product Version
treck tcp\/ip *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:treck:tcp\\/ip:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F9D0DF-D9F0-4183-AC07-C799EFFE36C8",
                     versionEndExcluding: "6.0.1.66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Treck TCP/IP stack before 6.0.1.66 has an IPv4 Integer Underflow.",
      },
      {
         lang: "es",
         value: "La pila Treck TCP/IP versiones anteriores a 6.0.1.66, presenta un Subdesbordamiento de Enteros de IPv4",
      },
   ],
   id: "CVE-2020-11909",
   lastModified: "2024-11-21T04:58:52.827",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-17T11:15:10.960",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "cve@mitre.org",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "cve@mitre.org",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://jsof-tech.com/vulnerability-disclosure-policy/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://security.netapp.com/advisory/ntap-20200625-0006/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-treck-ip-stack-JyBQ5GyC",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.jsof-tech.com/ripple20/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.kb.cert.org/vuls/id/257161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/257161/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Product",
            "Vendor Advisory",
         ],
         url: "https://www.treck.com",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-191",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-202006-0258
Vulnerability from variot

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing. IP-in-IP encapsulation is a tunneling protocol specified in RFC 2003 that allows for IP packets to be encapsulated inside another IP packets. This is very similar to IPSEC VPNs in tunnel mode, except in the case of IP-in-IP, the traffic is unencrypted. An IP-in-IP device is considered to be vulnerable if it accepts IP-in-IP packets from any source to any destination without explicit configuration between the specified source and destination IP addresses. This unexpected Data Processing Error (CWE-19) by a vulnerable device can be abused to perform reflective DDoS and in certain scenarios used to bypass network access control lists. Because the forwarded network packet may not be inspected or verified by vulnerable devices, there are possibly other unexpected behaviors that can be abused by an attacker on the target device or the target device's network environment. An unauthenticated attacker can route network traffic through a vulnerable device, which may lead to reflective DDoS, information leak and bypass of network access controls. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco. A code issue vulnerability exists in Cisco NX-OS Software due to the program decapsulating and processing the IP in an IP packet destined for a locally configured IP address. A remote attacker can exploit this vulnerability to bypass the access control list or cause a denial of service by means of a specially crafted IP in the IP packet. The following products and versions are affected: Nexus 1000 Virtual Edge for VMware vSphere; Nexus 1000V Switch for Microsoft Hyper-V; Nexus 1000V Switch for VMware vSphere; Nexus 3000 Series Switches; Nexus 5500 Platform Switches; Nexus 5600 Platform Switches; Nexus 6000 Switches ; Nexus 7000 Series Switches; Nexus 9000 Series Switches in standalone NX-OS mode; UCS 6200 Series Fabric Interconnects; UCS 6300 Series Fabric Interconnects

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0258",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(0\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1e\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sk3\\(1.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i1\\(2\\)",
         },
         {
            model: "ucs manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(3n\\)a",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(0\\)dx\\(1\\)",
         },
         {
            model: "tcp\\/ip",
            scope: "lt",
            trust: 1,
            vendor: "treck",
            version: "6.0.1.67",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm3\\(1.1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(9\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(2\\)d1\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a3\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(0\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)d1\\(3a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(0\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(6\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(2.8\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(1\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1j\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(5\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(8\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm3\\(2.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(8\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(7\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv5\\(1.2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i3\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(8a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(7\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(5\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(2\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u4\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(20\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(6\\)n1\\(2s\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i2\\(2b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(0\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sk3\\(2.2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)a1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(8b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u1\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(4\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(6\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(7\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.5b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv5\\(1.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(3\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(5\\)d1\\(1\\)",
         },
         {
            model: "unified computing system",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u4\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(14a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(6\\)",
         },
         {
            model: "x3220nr",
            scope: "lt",
            trust: 1,
            vendor: "hp",
            version: "3.00.11.08",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(7\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)d1\\(1d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(2c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(6\\)n1\\(4s\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n1\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)d1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(3\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(9\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm1\\(5.2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(3.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.15\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a3\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)n1\\(1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i2\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(3\\)i1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(1\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv5\\(1.3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(9b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(2d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(8b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(9\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(24\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i2\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(5b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(1\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(1\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(3\\)i1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.4b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(5a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1g\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(7\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(8\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(20a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(2b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(8\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(7\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(12\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(5\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(4\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(8\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(6b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u3\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(3\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(6\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm1\\(5.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1f\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(18\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1f\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm3\\(1.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u5\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(5\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(6\\)n1\\(3s\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(4.1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(2\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(2.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(4.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)a1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(3\\)i1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a3\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(4\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(2\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm1\\(5.2b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u4\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(6\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)a1\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(4\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sk3\\(2.1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(4\\)n1\\(1c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(4.1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(4\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i3\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(2.5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(1\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)d1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sk3\\(2.2b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(22\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(1d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(0\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u2\\(2d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(9a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.10\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(0\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(1\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u3\\(2b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1i\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm3\\(1.1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i2\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(0\\)d1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(2\\)d1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sk3\\(2.1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u3\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(1\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u4\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i3\\(3a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(2\\)d1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(14b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(3\\)i1\\(1z\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(3a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(0\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(1.5a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1e\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(6a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a4\\(6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)n2\\(6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)a1\\(1d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(16\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(2\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(4\\)n1\\(1d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(5\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1d\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(4\\)n1\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(7\\)n1\\(1a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.0\\(7\\)n1\\(1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)n1\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(0\\)d1\\(1\\)",
         },
         {
            model: "saros",
            scope: "lt",
            trust: 1,
            vendor: "digi",
            version: "8.1.0.1",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(10\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(7\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u1\\(3\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(9a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u5\\(1h\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm1\\(5.2a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u2\\(4.92.4z\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u3\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i2\\(1\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sv3\\(3.15\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(14\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.0\\(3\\)u1\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u3\\(6\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm1\\(5.2c\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0\\(2\\)u4\\(4\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)sm3\\(1.1b\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(8a\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)i3\\(2\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(3\\)n1\\(5\\)",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(4\\)d1\\(1\\)",
         },
         {
            model: "saros",
            scope: null,
            trust: 0.8,
            vendor: "digi",
            version: null,
         },
         {
            model: "tcp/ip stack",
            scope: null,
            trust: 0.8,
            vendor: "treck",
            version: null,
         },
         {
            model: "nx-os",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "x3220nr",
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:digi:saros",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:treck:tcp%2fip",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:cisco:nx-os",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:hp:x3220nr_firmware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Thanks to Yannay Livneh  for reporting this issue to us. This document was written by Vijay Sarvepalli. ",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-10136",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2020-10136",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.1,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "JVNDB-2020-004993",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-162584",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-10136",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "Low",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "JVNDB-2020-004993",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-10136",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "JVNDB-2020-004993",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202006-074",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-162584",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-10136",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing. IP-in-IP encapsulation is a tunneling protocol specified in RFC 2003 that allows for IP packets to be encapsulated inside another IP packets. This is very similar to IPSEC VPNs in tunnel mode, except in the case of IP-in-IP, the traffic is unencrypted. An IP-in-IP device is considered to be vulnerable if it accepts IP-in-IP packets from any source to any destination without explicit configuration between the specified source and destination IP addresses. This unexpected Data Processing Error (CWE-19)  by a vulnerable device can be abused to perform reflective DDoS and in certain scenarios used to bypass network access control lists. Because the forwarded network packet may not be inspected or verified by vulnerable devices, there are possibly other unexpected behaviors that can be abused by an attacker on the target device or the target device's network environment. An unauthenticated attacker can route network traffic through a vulnerable device, which may lead to reflective DDoS, information leak and bypass of network access controls. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco. A code issue vulnerability exists in Cisco NX-OS Software due to the program decapsulating and processing the IP in an IP packet destined for a locally configured IP address. A remote attacker can exploit this vulnerability to bypass the access control list or cause a denial of service by means of a specially crafted IP in the IP packet. The following products and versions are affected: Nexus 1000 Virtual Edge for VMware vSphere; Nexus 1000V Switch for Microsoft Hyper-V; Nexus 1000V Switch for VMware vSphere; Nexus 3000 Series Switches; Nexus 5500 Platform Switches; Nexus 5600 Platform Switches; Nexus 6000 Switches ; Nexus 7000 Series Switches; Nexus 9000 Series Switches in standalone NX-OS mode; UCS 6200 Series Fabric Interconnects; UCS 6300 Series Fabric Interconnects",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-10136",
            trust: 3.4,
         },
         {
            db: "CERT/CC",
            id: "VU#636397",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.1917",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   id: "VAR-202006-0258",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-23T21:59:12.953000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Top Page",
            trust: 1.6,
            url: "https://www8.hp.com/us/en/home.html",
         },
         {
            title: "cisco-sa-nxos-ipip-dos-kCT9X4",
            trust: 0.8,
            url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4",
         },
         {
            title: "Digi Security Center",
            trust: 0.8,
            url: "https://www.digi.com/resources/security",
         },
         {
            title: "Cisco NX-OS Software Fixes for code issue vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119986",
         },
         {
            title: "Cisco: Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-nxos-ipip-dos-kCT9X4",
         },
         {
            title: "Contents",
            trust: 0.1,
            url: "https://github.com/hktalent/bug-bounty ",
         },
         {
            title: "欢迎关注阿尔法实验室微信公众号",
            trust: 0.1,
            url: "https://github.com/alphaSeclab/sec-daily-2020 ",
         },
         {
            title: "The Register",
            trust: 0.1,
            url: "https://www.theregister.co.uk/2020/06/08/security_roundup_june_5/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-290",
            trust: 1.9,
         },
         {
            problemtype: "CWE-19",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "https://kb.cert.org/vuls/id/636397/",
         },
         {
            trust: 2.5,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-nxos-ipip-dos-kct9x4",
         },
         {
            trust: 1.8,
            url: "https://www.kb.cert.org/vuls/id/636397",
         },
         {
            trust: 1.8,
            url: "https://www.digi.com/resources/security",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-10136",
         },
         {
            trust: 1,
            url: "https://datatracker.ietf.org/doc/html/rfc6169",
         },
         {
            trust: 0.8,
            url: "https://tools.ietf.org/html/rfc2003",
         },
         {
            trust: 0.8,
            url: "https://tools.ietf.org/html/rfc6169",
         },
         {
            trust: 0.8,
            url: "https://github.com/certcc/poc-exploits/tree/master/cve-2020-10136",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-10136",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/ta/jvnta90492923/",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/cve/cve-2020-10136",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.1917/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/cisco-nx-os-ip-filtering-bypass-with-encapsulation-32373",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/290.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://github.com/hktalent/bug-bounty",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-06-02T00:00:00",
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            date: "2020-06-02T00:00:00",
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            date: "2020-06-02T00:00:00",
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            date: "2020-06-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            date: "2020-06-01T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            date: "2020-06-02T09:15:09.967000",
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-09-30T00:00:00",
            db: "CERT/CC",
            id: "VU#636397",
         },
         {
            date: "2020-07-29T00:00:00",
            db: "VULHUB",
            id: "VHN-162584",
         },
         {
            date: "2020-07-29T00:00:00",
            db: "VULMON",
            id: "CVE-2020-10136",
         },
         {
            date: "2020-06-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-004993",
         },
         {
            date: "2020-07-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
         {
            date: "2024-11-21T04:54:53.377000",
            db: "NVD",
            id: "CVE-2020-10136",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IP-in-IP protocol routes arbitrary traffic by default",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#636397",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "code problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202006-074",
         },
      ],
      trust: 0.6,
   },
}