#VU50593 Use of insufficiently random values in Nut/Net - CVE-2020-27213

 

#VU50593 Use of insufficiently random values in Nut/Net - CVE-2020-27213

Published: February 10, 2021


Vulnerability identifier: #VU50593
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-27213
CWE-ID: CWE-330
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Nut/Net
Software vendor:
ethernut

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the ISN generator relies on a highly predictable source (system timer) and has constant increments. A remote attacker can interfere with traffic, spoof the connection and gain access to sensitive information.  


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links