{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2020-10136", "ASSIGNER": "cert@cert.org", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing", "cweId": "CWE-290" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "IETF", "product": { "product_data": [ { "product_name": "RFC2003 - IP Encapsulation within IP", "version": { "version_data": [ { "version_affected": "=", "version_value": "STD 1" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://kb.cert.org/vuls/id/636397/", "refsource": "MISC", "name": "https://kb.cert.org/vuls/id/636397/" }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4", "refsource": "MISC", "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4" }, { "url": "https://www.digi.com/resources/security", "refsource": "MISC", "name": "https://www.digi.com/resources/security" }, { "url": "https://www.kb.cert.org/vuls/id/636397", "refsource": "MISC", "name": "https://www.kb.cert.org/vuls/id/636397" }, { "url": "https://datatracker.ietf.org/doc/html/rfc6169", "refsource": "MISC", "name": "https://datatracker.ietf.org/doc/html/rfc6169" } ] }, "generator": { "engine": "cveClient/1.0.15" }, "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Users can block IP-in-IP packets by filtering IP protocol number 4. Note this filtering is for the IPv4 Protocol (or IPv6 Next Header) field value of 4 and not IP protocol version 4 (IPv4)." } ], "solution": [ { "lang": "en", "value": "Customers should apply the latest patch provided by the affected vendor that addresses this issue and prevents unspecified IP-in-IP packets from being processed. Devices manufacturers are urged to disable IP-in-IP in their default configuration and require their customers to explicitly configure IP-in-IP as and when needed." } ], "credits": [ { "lang": "en", "value": "Thanks to Yannay Livneh for reporting this issue." } ] }