

Rewterz Threat Alert – Iranian Hackers Exploit RDP to Distribute Dharma Ransomware
August 26, 2020
Rewterz Threat Advisory – ICS: CVE-2020-16235 – Emerson OpenEnterprise SCADA Software
August 26, 2020
Rewterz Threat Alert – Iranian Hackers Exploit RDP to Distribute Dharma Ransomware
August 26, 2020
Rewterz Threat Advisory – ICS: CVE-2020-16235 – Emerson OpenEnterprise SCADA Software
August 26, 2020Severity
High
Analysis Summary
Multiple vulnerabilities have been reported in The Treck TCP/IP stack by Treck Inc.
- Improper input validation in ARP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read. CVE-2020-11914
- Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read. CVE-2020-11913
- Improper input validation in TCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read.. CVE-2020-11912
- The affected product is vulnerable to improper access control, which may allow an attacker to change one specific configuration value. CVE-2020-11911
- Improper input validation in ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read. CVE-2020-11910
- Improper input validation in IPv4 component when handling a packet sent by an unauthorized network attacker. CVE-2020-11909
- Improper null termination in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information. CVE-2020-11908
- Improper handling of length parameter inconsistency in TCP component, from a packet sent by an unauthorized network attacker. CVE-2020-11907
- Improper input validation CWE-20 in ethernet link layer component from a packet sent by an unauthorized user. CVE-2020-11906
- Possible out-of-bounds read in DHCPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information. CVE-2020-11905
- Possible integer overflow or wraparound in memory allocation component when handling a packet sent by an unauthorized network attacker may result in out-of-bounds write. CVE-2020-11904
- Possible out-of-bounds read in DHCP component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow exposure of sensitive information. CVE-2020-11903
- Improper input validation in IPv6 over IPv4 tunneling component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read. CVE-2020-11902
- Improper input validation in DNS resolver component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution. CVE-2020-11901
- Possible double free in IPv4 tunneling component when handling a packet sent by a network attacker. This vulnerability may result in use after free. CVE-2020-11900
- Improper input validation in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may allow out-of-bounds Read and a possible Denial of Service. CVE-2020-11899
- Improper handling of length parameter inconsistency in IPv4/ICMPv4 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in out-of-bounds Read. CVE-2020-11898
- Improper handling of length parameter inconsistency in IPv6 component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in possible out-of-bounds write. CVE-2020-11897
- Improper handling of length parameter inconsistency in IPv4/UDP component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution. CVE-2020-11896
The Treck TCP/IP stack may be known by other names such as Kasago TCP/IP, ELMIC, Net+ OS, Quadnet, GHNET v2, Kwiknet, or AMX.
Impact
- Remote code execution
- Exposure of sensitive information
Affected Vendors
Treck Inc.
Affected Products
The Treck TCP/IP stack is affected including: IPv4
IPv6
UDP
DNS
DHCP
TCP
ICMPv4
ARP
Remediation
Treck recommends users to apply the latest version of the affected products (Treck TCP/IP 6.0.1.67 or later versions). To obtain patches, email security@treck.com.