First published: Mon Dec 04 2006(Updated: )
Teredo creates trusted peer entries for arbitrary incoming source Teredo addresses, even if the low 32 bits represent an intranet address, which might allow remote attackers to send IPv4 traffic to intranet hosts that use non-RFC1918 addresses, bypassing IPv4 ingress filtering.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Teredo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6264 is considered a moderate severity vulnerability due to its potential to bypass IPv4 ingress filtering.
To mitigate CVE-2006-6264, users should disable Teredo tunneling unless it is explicitly needed or apply appropriate filtering and access control measures.
CVE-2006-6264 can facilitate remote attacks that send IPv4 traffic to intranet hosts, potentially exposing sensitive services.
CVE-2006-6264 specifically affects Microsoft Teredo implementations.
CVE-2006-6264 remains relevant as organizations continue to use Teredo for IPv6 connectivity, making it imperative to apply security best practices.