A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.
This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Microsoft WindowsThe vulnerability is due to an error when the vulnerable software handles a maliciously crafted messages. Successful exploitation could lead to Remote Code Execution on the victim machine.
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows Server, version 1903 (Server Core installation)
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
vijaycert | https://twitter.com/chompie1337/status/1583666434668101637 | Source vijaycert 1583966198646964225 | 2022/10/23 |
buaqbot | https://ift.tt/9ikC8Sc | Source buaqbot 1599382650116263941 | 2022/12/04 |
buaqbot | https://ift.tt/hvBwV17 | Source buaqbot 1599382650116263941 | 2022/12/04 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
vijaycert | twitter.com | Show Tweet |
buaqbot | ift.tt | Show Tweet |
buaqbot | ift.tt | Show Tweet |
Name | URL |
---|---|
advanced-threat-research/CVE-2020-16898 | https://github.com/advanced-threat-research/CVE-2020-16898 |
ZephrFish/CVE-2020-16898 | https://github.com/ZephrFish/CVE-2020-16898 |
momika233/CVE-2020-16898-exp | https://github.com/momika233/CVE-2020-16898-exp |
0xeb-bp/cve-2020-16898 | https://github.com/0xeb-bp/cve-2020-16898 |
jiansiting/cve-2020-16898 | https://github.com/jiansiting/cve-2020-16898 |
komomon/CVE-2020-16898--EXP-POC | https://github.com/komomon/CVE-2020-16898--EXP-POC |
Maliek/CVE-2020-16898_Check | https://github.com/Maliek/CVE-2020-16898_Check |
corelight/CVE-2020-16898 | https://github.com/corelight/CVE-2020-16898 |
Ascotbe/Kernelhub | https://github.com/Ascotbe/Kernelhub |
CPO-EH/CVE-2020-16898_Checker | https://github.com/CPO-EH/CVE-2020-16898_Checker |
Name | URL |
---|---|
advanced-threat-research/CVE-2020-16898 | github.com |
ZephrFish/CVE-2020-16898 | github.com |
momika233/CVE-2020-16898-exp | github.com |
0xeb-bp/cve-2020-16898 | github.com |
jiansiting/cve-2020-16898 | github.com |
komomon/CVE-2020-16898--EXP-POC | github.com |
Maliek/CVE-2020-16898_Check | github.com |
corelight/CVE-2020-16898 | github.com |
Ascotbe/Kernelhub | github.com |
CPO-EH/CVE-2020-16898_Checker | github.com |