First published: Tue Oct 10 2023(Updated: )
In Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
open-iscsi | ||
CycloneTCP | ||
Multiple NDKTCPIP, Version 2.25 and prior | ||
butok FNET | ||
Contiki OS | ||
uC/TCP-IP | ||
Contiki-NG | ||
uIP (EOL) | ||
altran picoTCP-NG | ||
picoTCP | ||
MPLAB Net | ||
Multiple Nucleus NET | ||
Multiple Nucleus ReadyStart for ARM, MIPS, and PPC | ||
CycloneTCP | =1.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27631 is considered a high severity vulnerability due to the improper randomness of TCP Initial Sequence Numbers.
To mitigate CVE-2020-27631, update to a version of CycloneTCP that has addressed the ISN generation issue.
CVE-2020-27631 affects Oryx CycloneTCP 1.9.6 and several other TCP/IP stacks including various versions of Nut/Net, NDKTCPIP, and uIP.
Exploiting CVE-2020-27631 can allow attackers to predict the TCP sequence numbers, leading to potential session hijacking or man-in-the-middle attacks.
As of now, updating to a patched version is the primary way to mitigate CVE-2020-27631, as there are no effective workarounds.