Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-28041

Опубликовано: 02 нояб. 2020
Источник: nvd
CVSS3: 6.5
CVSS2: 4.3
EPSS Низкий

Описание

The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim's intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:netgear:nighthawk_r7000_firmware:1.0.9.64_10.2.64:*:*:*:*:*:*:*
cpe:2.3:h:netgear:nighthawk_r7000:-:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.0106
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-276

Связанные уязвимости

CVSS3: 6.5
github
больше 3 лет назад

The SIP ALG implementation on NETGEAR Nighthawk R7000 1.0.9.64_10.2.64 devices allows remote attackers to communicate with arbitrary TCP and UDP services on a victim's intranet machine, if the victim visits an attacker-controlled web site with a modern browser, aka NAT Slipstreaming. This occurs because the ALG takes action based on an IP packet with an initial REGISTER substring in the TCP data, and the correct intranet IP address in the subsequent Via header, without properly considering that connection progress and fragmentation affect the meaning of the packet data.

EPSS

Процентиль: 77%
0.0106
Низкий

6.5 Medium

CVSS3

4.3 Medium

CVSS2

Дефекты

CWE-276