Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12695 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Universal Plug and Play (UPnP) Other software / Other software solutions |
Vendor | Open Connectivity Foundation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU28948
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-12695
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to perform a distributed denial of service (DDoS) attack.
The vulnerability exists due to a CallStranger issue in the UPnP SUBSCRIBE functionality. A remote attacker can send traffic to arbitrary destinations, leading to amplified DDoS attacks and data exfiltration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsUniversal Plug and Play (UPnP): before 2020-04-17
CPE2.3 External linkshttp://www.openwall.com/lists/oss-security/2020/06/08/2
http://github.com/yunuscadirci/CallStranger
http://www.callstranger.com
http://www.kb.cert.org/vuls/id/339275
http://www.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-universal-plug-and-play-upnp-puts-billions-of
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?