Denial of service in Shadankun Server Security Type

Published: 2020-08-31
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2020-5622
Exploitation vector Network
Public exploit N/A
Vulnerable software
Shadankun Server Security Type
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor Cyber Security Cloud

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Improper Check or Handling of Exceptional Conditions

EUVDB-ID: #VU46131

Risk: Medium

CVSSv3.1: 4.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-5622

CWE-ID: CWE-703 - Improper Check or Handling of Exceptional Conditions

Exploit availability: No


The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists when "Rule id" is assigned by the product's internal script overlap, due to it would not be able to add newly detected attack source IP addresses as the blocking targets. A remote attacker can cause a denial of service condition on the target system.


Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Shadankun Server Security Type: 1.5.3

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.