CVE-2020-16898

12 documents9 sources
Severity
8.8HIGH
EPSS
32.7%
top 3.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMP

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages14 packages

CVEListV5microsoft/windows_server_201910.0.0publication
CVEListV5microsoft/windows_server_version_200410.0.0publication
CVEListV5microsoft/windows_10_version_170910.0.0publication
CVEListV5microsoft/windows_10_version_180310.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8vrv-2fm5-wpvr: A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP2022-05-24
CVEList
Windows TCP/IP Remote Code Execution Vulnerability2020-10-16

📋Vendor Advisories

1
Microsoft
Windows TCP/IP Remote Code Execution Vulnerability2020-10-13

🕵️Threat Intelligence

3
Unit42
Threat Brief: Microsoft Vulnerability CVE-2020-168982020-10-14
Qualys
Microsoft Windows TCP/IP Remote Code Execution Vulnerability (CVE-2020-16898) – Automatically Discover, Prioritize and Remediate Using Qualys VMDR® | Qualys2020-10-14
Unit42
Threat Brief: Microsoft Vulnerability CVE-2020-168982020-10-14
CVE-2020-16898 (HIGH CVSS 8.8) | A remote code execution vulnerabili | cvebase.io