5.3
CVE-2020-10136
- EPSS 24.27%
- Veröffentlicht 02.06.2020 09:15:09
- Zuletzt bearbeitet 03.11.2025 21:15:39
- Quelle cret@cert.org
- CVE-Watchlists
- Unerledigt
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hp ≫ X3220nr Firmware Version < 3.00.11.08
Cisco ≫ Unified Computing System Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 24.27% | 0.959 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
CWE-290 Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.