First published: Wed Apr 15 2020(Updated: )
Triangle MicroWorks DNP3 Outstation LibrariesDNP3 Outstation .NET Protocol components and DNP3 Outstation ANSI C source code libraries are affected:3.16.00 through 3.25.01. A specially crafted message may cause a stack-based buffer overflow. Authentication is not required to exploit this vulnerability.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Trianglemicroworks Dnp3 Source Code Library | >=3.16.00<=3.25.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6996 has a high severity rating due to the potential for remote exploitation leading to a stack-based buffer overflow.
To fix CVE-2020-6996, upgrade the affected DNP3 Outstation libraries to versions later than 3.25.01.
CVE-2020-6996 affects Triangle MicroWorks DNP3 Outstation Libraries versions 3.16.00 through 3.25.01.
No, CVE-2020-6996 can be exploited without requiring authentication.
CVE-2020-6996 allows for a remote attacker to send specially crafted messages that can lead to a stack-based buffer overflow.