Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-23018

Опубликовано: 14 янв. 2025
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.

An insecure configuration flaw was found in the IPv4-in-IPv6 and IPv6-in-IPv6 protocols (RFC2473). When configured to not require authentication or filtering, this issue could allow a remote unauthenticated attacker to spoof packets or bypass access controls.

Отчет

This vulnerability is rated as Low impact as it requires a known higher risk configuration. Multiple layers of defaults (packet forwarding and these specific protocols) are disabled by default. Red Hat provides guidance in documentation (linked in references section) on how to configure the system in a more secure manner, which avoids the risk of this vulnerability.

Меры по смягчению последствий

See references section for detailed guidance.

Дополнительная информация

Статус:

Low
Дефект:
CWE-348
https://bugzilla.redhat.com/show_bug.cgi?id=2337531networkmanager: 4in6 and 6in6 protocols excessive trust

EPSS

Процентиль: 28%
0.00099
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
nvd
12 месяцев назад

IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.

CVSS3: 5.4
github
12 месяцев назад

IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.

CVSS3: 8.1
fstec
12 месяцев назад

Уязвимость протоколов туннелирования пакетов IPv4-in-IPv6 и IPv6-in-IPv4, связанная с недостаточной проверкой источника канала связи, позволяющая нарушителю реализовать атаки типа «подмена доверенного объекта»

EPSS

Процентиль: 28%
0.00099
Низкий

5.4 Medium

CVSS3