CVE-2020-16898

Description from NVD

A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.

Information Acquisition Date:2021-04-27T10:54Z
CVSS 2.0: 5.8 MEDIUM CVSS 3.x: 8.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:A/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
     source:MISC
     tags:Patch    Vendor Advisory    

Description from Forti

Microsoft: Windows TCP/IP Remote Code Execution Vulnerability

This indicates an attack attempt to exploit a Buffer Overflow vulnerability in Microsoft WindowsThe vulnerability is due to an error when the vulnerable software handles a maliciously crafted messages. Successful exploitation could lead to Remote Code Execution on the victim machine.

Information Acquisition Date:2020/11/13

Affected Products

Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows Server, version 1903 (Server Core installation)
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows Server, version 2004 (Server Core installation)

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898

References

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...243
http://twinybots.ch26
https://lists.astaro.com/ASGV9-IPS-rules.html19
https://twitter.com/search?src=sprv&q=CVE-2020-1689811
https://isc.sans.edu/diary/rss/266846
https://blog.rapid7.com/2020/10/14/there-goes-the-neighborh...6
https://news.sophos.com/en-us/2020/10/13/top-reason-to-appl...6
http://mi6rogue.com/news5
https://unit42.paloaltonetworks.com/cve-2020-16898/5
https://ift.tt/3du3eqV4
https://vimeo.com/4678349514
https://srcincite.io/advisories/src-2020-0022/4
https://www.zdnet.com/article/microsoft-october-2020-patch-...4
https://corelight.blog/2020/10/15/zeek-community-activates-...4
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/cve-20...4
http://site.pi3.com.pl/exp/p_CVE-2020-16898.py4
https://buff.ly/3nQPb3m3
https://github.com/advanced-threat-research/CVE-2020-168983
https://www.gub.uy/centro-nacional-respuesta-incidentes-seg...3
http://www.sans.org/u/182v3
https://threatpost.com/october-patch-tuesday-wormable-bug/1...3
http://blog.pi3.com.pl/?p=7803
https://blog.zecops.com/vulnerabilities/exploring-the-explo...3
https://threatninja.net/cve-2020-16898/3
https://www.tenable.com/blog/microsoft-october-2020-patch-t...3
http://tweetedtimes.com/Pentest101MX?s=tnp3
http://newsbythehour.org/cybr3
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-...3
https://blog.quarkslab.com/beware-the-bad-neighbor-analysis...3
http://feedproxy.google.com/~r/Snort/~3/JG17MBMw4eo/snort-r...3
https://news.ycombinator.com/item?id=247679413
https://reportcybercrime.com/3
http://blog.segu-info.com.ar/2020/10/bad-neighbor-cve-2020-...3
https://www.bleepingcomputer.com/news/security/us-cyber-com...3
https://portal.msrc.microsoft.com/en-US/security-guidance/a...3

Information from Twitter

User URL Info Source Date
vijaycert https://twitter.com/chompie1337/status/1583666434668101637 Source vijaycert        1583966198646964225 2022/10/23
buaqbot https://ift.tt/9ikC8Sc Source buaqbot          1599382650116263941 2022/12/04
buaqbot https://ift.tt/hvBwV17 Source buaqbot          1599382650116263941 2022/12/04

List of frequently cited URLs

URLNum of Times Referred to
alerts.vulmon.com243
twinybots.ch26
lists.astaro.com19
twitter.com11
isc.sans.edu6
blog.rapid7.com6
news.sophos.com6
mi6rogue.com5
unit42.paloaltonetworks.com5
ift.tt4
vimeo.com4
srcincite.io4
www.zdnet.com4
corelight.blog4
www.mcafee.com4
site.pi3.com.pl4
buff.ly3
github.com3
www.gub.uy3
www.sans.org3
threatpost.com3
blog.pi3.com.pl3
blog.zecops.com3
threatninja.net3
www.tenable.com3
tweetedtimes.com3
newsbythehour.org3
www.trustwave.com3
blog.quarkslab.com3
feedproxy.google.com3
news.ycombinator.com3
reportcybercrime.com3
blog.segu-info.com.ar3
www.bleepingcomputer.com3
portal.msrc.microsoft.com3

Information from Twitter

User URL Info Source
vijaycert twitter.com Show Tweet
buaqbot ift.tt Show Tweet
buaqbot ift.tt Show Tweet

GitHub Search Results: Up to 10
NameURL
advanced-threat-research/CVE-2020-16898 https://github.com/advanced-threat-research/CVE-2020-16898
ZephrFish/CVE-2020-16898 https://github.com/ZephrFish/CVE-2020-16898
momika233/CVE-2020-16898-exp https://github.com/momika233/CVE-2020-16898-exp
0xeb-bp/cve-2020-16898 https://github.com/0xeb-bp/cve-2020-16898
jiansiting/cve-2020-16898 https://github.com/jiansiting/cve-2020-16898
komomon/CVE-2020-16898--EXP-POC https://github.com/komomon/CVE-2020-16898--EXP-POC
Maliek/CVE-2020-16898_Check https://github.com/Maliek/CVE-2020-16898_Check
corelight/CVE-2020-16898 https://github.com/corelight/CVE-2020-16898
Ascotbe/Kernelhub https://github.com/Ascotbe/Kernelhub
CPO-EH/CVE-2020-16898_Checker https://github.com/CPO-EH/CVE-2020-16898_Checker

GitHub Search Results: Up to 10
NameURL
advanced-threat-research/CVE-2020-16898 github.com
ZephrFish/CVE-2020-16898 github.com
momika233/CVE-2020-16898-exp github.com
0xeb-bp/cve-2020-16898 github.com
jiansiting/cve-2020-16898 github.com
komomon/CVE-2020-16898--EXP-POC github.com
Maliek/CVE-2020-16898_Check github.com
corelight/CVE-2020-16898 github.com
Ascotbe/Kernelhub github.com
CPO-EH/CVE-2020-16898_Checker github.com

2022/12/04 Score : 0
Added Har-sia Database : 2020/10/14
Last Modified : 2022/12/04
Highest Scored Date : 2020/10/14
Highest Score : 304