Denial of service in Open Connectivity Foundation Universal Plug and Play (UPnP)



Published: 2020-06-10 | Updated: 2022-08-07
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-12695
CWE-ID CWE-20
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Universal Plug and Play (UPnP)
Other software / Other software solutions

Vendor Open Connectivity Foundation

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU28948

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2020-12695

CWE-ID: CWE-20 - Improper input validation

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a distributed denial of service (DDoS) attack.

The vulnerability exists due to a CallStranger issue in the UPnP SUBSCRIBE functionality. A remote attacker can send traffic to arbitrary destinations, leading to amplified DDoS attacks and data exfiltration.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Universal Plug and Play (UPnP): before 2020-04-17

CPE2.3 External links

http://www.openwall.com/lists/oss-security/2020/06/08/2
http://github.com/yunuscadirci/CallStranger
http://www.callstranger.com
http://www.kb.cert.org/vuls/id/339275
http://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###