Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12695

Опубликовано: 08 июн. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.

Отчет

This flaw does not affect the wpa_supplicant package as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8. wpa_supplicant's WiFi Protected Setup (WPS) External Registrar functionality, which uses UPnP to act as a registrar for a WiFi access point, and hostapd's WPS UPnP functionality, are disabled in the build configuration. Additionally, wpa_supplicant's P2P functionality does not support UPnP as shipped in Red Hat Enterprise Linux 5, 6, 7 and 8.

Меры по смягчению последствий

To mitigate this flaw, close off the UPnP UDP port (usually 1900) and UPnP service ports from the Internet using a firewall. It's important to note that UPnP service ports vary based on the device, so device documentation should be consulted. Do not expose UPnP servers to the Internet. Exploitation of this flaw relies on HTTP SUBSCRIBE and NOTIFY requests, which can be blocked using a network security appliance, as another mitigation option.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantOut of support scope
Red Hat Enterprise Linux 6gssdpOut of support scope
Red Hat Enterprise Linux 6gupnpOut of support scope
Red Hat Enterprise Linux 6wpa_supplicantOut of support scope
Red Hat Enterprise Linux 7gssdpWill not fix
Red Hat Enterprise Linux 7gupnpWill not fix
Red Hat Enterprise Linux 7wpa_supplicantNot affected
Red Hat Enterprise Linux 8wpa_supplicantNot affected
Red Hat Enterprise Linux 8gssdpFixedRHSA-2021:178918.05.2021
Red Hat Enterprise Linux 8gupnpFixedRHSA-2021:178918.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-400
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=1846006hostapd: UPnP SUBSCRIBE misbehavior in WPS AP

EPSS

Процентиль: 89%
0.04731
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.

CVSS3: 7.5
nvd
больше 5 лет назад

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.

CVSS3: 7.5
debian
больше 5 лет назад

The Open Connectivity Foundation UPnP specification before 2020-04-17 ...

rocky
больше 4 лет назад

Moderate: gssdp and gupnp security update

CVSS3: 7.5
github
больше 3 лет назад

The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.

EPSS

Процентиль: 89%
0.04731
Низкий

7.5 High

CVSS3