First published: Wed Jun 17 2020(Updated: )
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Treck TCP/IP stack IPv6 | <6.0.1.66 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-11911 is medium with a severity value of 5.3.
To fix CVE-2020-11911, update the Treck TCP/IP stack to version 6.0.1.66 or higher.
The affected software for CVE-2020-11911 is the Treck TCP/IP stack version before 6.0.1.66.
CVE-2020-11911 is a vulnerability in the Treck TCP/IP stack before 6.0.1.66 that allows for improper ICMPv4 access control.
More information about CVE-2020-11911 can be found at the following references: [reference 1](http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt), [reference 2](https://jsof-tech.com/vulnerability-disclosure-policy/), [reference 3](https://security.netapp.com/advisory/ntap-20200625-0006/).