Lucene search

K
cvelistTalosCVELIST:CVE-2020-13529
HistoryMay 10, 2021 - 3:08 p.m.

CVE-2020-13529

2021-05-1015:08:34
CWE-290
talos
www.cve.org
12
denial-of-service
systemd 245
dhcp ack spoofing

CVSS3

6.1

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

49.6%

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

CNA Affected

[
  {
    "product": "Systemd",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Canonical Ubuntu 20.04 LTS, Systemd 245"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

6.3

Confidence

High

EPSS

0.001

Percentile

49.6%