First published: Tue Oct 10 2023(Updated: )
In Microchip MPLAB Net 3.6.1, TCP ISNs are improperly random.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Multiple Nut/Net, Version 5.1 and prior | ||
Multiple CycloneTCP, Version 1.9.6 and prior | ||
Multiple NDKTCPIP, Version 2.25 and prior | ||
butok FNET | ||
Contiki OS | ||
Multiple uC/TCP-IP (EOL), Version 3.6.0 and prior | ||
Contiki-NG | ||
Multiple uIP (EOL), Version 1.0 and prior | ||
altran picoTCP-NG | ||
Multiple picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple MPLAB Net, Version 3.6.1 and prior | ||
Multiple Nucleus NET, All versions prior to Version 5.2 | ||
Multiple Nucleus ReadyStart for ARM, MIPS, and PPC, All versions prior to Version 2012.12 | ||
Microchip MPLAB Network Creator | =3.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-27636.
The title of the vulnerability is 'In Microchip MPLAB Net 3.6.1 TCP ISNs are improperly random.'
CVE-2020-27636 has a severity rating of 9.1 (critical).
Microchip MPLAB Net 3.6.1 is affected by CVE-2020-27636.
Please refer to the references provided for information on fixing the vulnerability in Microchip MPLAB Net 3.6.1.