### [CVE-2020-13529](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529) ![](https://img.shields.io/static/v1?label=Product&message=Systemd&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CoolerVoid/master_librarian - https://github.com/Live-Hack-CVE/CVE-2020-13529 - https://github.com/PajakAlexandre/wik-dps-tp02 - https://github.com/cdupuis/image-api - https://github.com/epequeno/devops-demo - https://github.com/fokypoky/places-list - https://github.com/onzack/trivy-multiscanner