An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-30T15:52:30.900Z

Reserved: 2020-10-20T00:00:00.000Z

Link: CVE-2020-27336

cve-icon Vulnrichment

Updated: 2024-08-04T16:11:36.599Z

cve-icon NVD

Status : Modified

Published: 2020-12-22T22:15:13.927

Modified: 2025-09-30T15:15:45.907

Link: CVE-2020-27336

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.