9.3
CVSSv2

CVE-2020-11901

Published: 17/06/2020 Updated: 21/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 9 | Impact Score: 6 | Exploitability Score: 2.2
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Treck TCP/IP stack prior to 6.0.1.66 allows Remote Code execution via a single invalid DNS response.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

treck tcp\\/ip

Vendor Advisories

A set of previously unknown vulnerabilities on the Treck IP stack implementation were disclosed on June 16, 2020 The vulnerabilities are collectively known as Ripple20 Exploitation of these vulnerabilities could result in remote code execution, denial of service (DoS), or information disclosure, depending on the specific vulnerability This advis ...
Multiple potential vulnerabilities may exist in the Treck Inc networking stack used in certain HP and Samsung-branded printers These may include, but not be limited to, denial of service or remote code execution Please refer to Treck Inc CVE’s below for further descriptions ...
Multiple potential vulnerabilities may exist in the Treck Inc networking stack used in certain HP and Samsung-branded printers These may include, but not be limited to, denial of service or remote code execution Please refer to Treck Inc CVE’s below for further descriptions ...

Github Repositories

Ripple20 Critical Vulnerabilities - Detection Logic and Signatures

Ripple20 Critical Vulnerabilities - Detection Logic and Signatures McAfee Advanced Threat Research Steve Povolny, Douglas McKee, Mark Bereza, D Kevin McGrath This document has been prepared by McAfee Advanced Threat Research in collaboration with JSOF who discovered and responsibly disclosed the vulnerabilities It is intended to serve as a joint research effort to produce val