No analysis available yet.
Vendor Solution
Customers should apply the latest patch provided by the affected vendor that addresses this issue and prevents unspecified IP-in-IP packets from being processed. Devices manufacturers are urged to disable IP-in-IP in their default configuration and require their customers to explicitly configure IP-in-IP as and when needed.
Vendor Workaround
Users can block IP-in-IP packets by filtering IP protocol number 4. Note this filtering is for the IPv4 Protocol (or IPv6 Next Header) field value of 4 and not IP protocol version 4 (IPv4).
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-03T20:33:32.981Z
Reserved: 2020-03-05T00:00:00.000Z
Link: CVE-2020-10136
No data.
Status : Modified
Published: 2020-06-02T09:15:09.967
Modified: 2025-11-03T21:15:39.860
Link: CVE-2020-10136
OpenCVE Enrichment
No data.