9.1
CVSSv3

CVE-2020-11898

Published: 17/06/2020 Updated: 21/07/2021
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The Treck TCP/IP stack prior to 6.0.1.66 improperly handles an IPv4/ICMPv4 Length Parameter Inconsistency, which might allow remote malicious users to trigger an information leak.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

treck tcp\\/ip

Vendor Advisories

A set of previously unknown vulnerabilities on the Treck IP stack implementation were disclosed on June 16, 2020 The vulnerabilities are collectively known as Ripple20 Exploitation of these vulnerabilities could result in remote code execution, denial of service (DoS), or information disclosure, depending on the specific vulnerability This advis ...
Multiple potential vulnerabilities may exist in the Treck Inc networking stack used in certain HP and Samsung-branded printers These may include, but not be limited to, denial of service or remote code execution Please refer to Treck Inc CVE’s below for further descriptions ...
Multiple potential vulnerabilities may exist in the Treck Inc networking stack used in certain HP and Samsung-branded printers These may include, but not be limited to, denial of service or remote code execution Please refer to Treck Inc CVE’s below for further descriptions ...

Github Repositories

Just a simple ripple20 PoC for Treck TCP/IP stacks

ripple_poc Just a simple ripple20 PoC for Treck TCP/IP stacks, based on the research from: wwwjsof-techcom/disclosures/ripple20/ and useful python code from: blognvisoeu/2020/07/16/testing-ripple20-a-closer-look-and-proof-of-concept-script-for-cve-2020-11898/ This script is just to get a heartbleed-esque information disclosure via ICMP Only requirement is s

Recent Articles

Psst.. You may want to patch this under-attack data-leaking Cisco bug – and these Ripple20 hijack flaws
The Register • Shaun Nichols in San Francisco • 25 Jul 2020

Plus: US govt sounds the alarm on industrial equipment attacks

In Brief Cisco this week emitted fixes for potentially serious vulnerabilities, one of which is already being exploited in the wild. The under-attack bug is CVE-2020-3452, a path-traversal flaw in Switchzilla's Adaptive Security Appliance and Firepower Threat Defense software that can be used to "read sensitive files on a targeted system." While there was no publicly available exploit code for the high-severity bug when first publicized, a day after issuing its advisory, Cisco said the flaw was ...