vulnerability
Microsoft CVE-2020-16898: Windows TCP/IP Remote Code Execution Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:A/AC:L/Au:N/C:P/I:P/A:P) | Nov 10, 2020 | Nov 10, 2020 | Nov 18, 2021 |
Severity
6
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
Published
Nov 10, 2020
Added
Nov 10, 2020
Modified
Nov 18, 2021
Description
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.
Solution(s)
msft-kb4577668-965a8ede-1eb7-46d6-83a6-7246ea98aae0msft-kb4577668-b815915f-3e4f-46ae-adc9-b90cd4b04100msft-kb4577671-4bc3ccc3-fcb0-4bbd-a2a5-cbbd40369d41msft-kb4577671-60a68333-26ce-47b6-9254-89d69caedfdfmsft-kb4577671-a4f7dcc3-65f1-4a75-8635-ea596100c299msft-kb4577671-c4223a46-1f35-41d8-ac8e-d2772d017f90msft-kb4577671-c42dc613-fb5b-4c45-925c-4f508584a635msft-kb4577671-ddbf4c81-6ca7-4986-999e-9275ef508017msft-kb4579311-d5cbc800-cb34-49c3-bde8-aa2f0ee05b2emsft-kb4579311-e9f0550d-b150-4eeb-bf5e-1a08b117e7afmsft-kb4579311-fa30a6bc-24ef-47b0-a6fa-d7971053e058msft-kb4580328-ebb00bd7-bff6-4567-8b7c-300728513137msft-kb4580328-f01aa891-eec2-4390-9974-dc226f4d6bf4msft-kb4580330-c2c988c8-cbbe-4a10-a26f-365b656443f3msft-kb4580330-fc2b1c51-dad6-4170-ba4d-85c43ed047d1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.