CVE-2020-27827
CVSS V2 High 7.1
CVSS V3 High 7.5
Description
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Overview
- CVE ID
- CVE-2020-27827
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Modified
- Published Version
- 2021-03-18T17:15:13
- Last Modified Date
- 2023-04-20T07:15:06
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:lldpd_project:lldpd:*:*:*:*:*:*:*:* | 1 | OR | 1.0.8 | |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.6.0 | 2.6.9 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.7.0 | 2.7.12 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.8.0 | 2.8.10 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.9.0 | 2.9.8 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.10.0 | 2.10.6 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.11.0 | 2.11.5 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.12.0 | 2.12.2 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.13.0 | 2.13.2 |
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* | 1 | OR | 2.14.0 | 2.14.1 |
AND | ||||
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_hmi_unified_comfort_panels_firmware:*:*:*:*:*:*:*:* | 1 | OR | 17 | |
cpe:2.3:h:siemens:simatic_hmi_unified_comfort_panels:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1542sp-1:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:tim_1531_irc_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.2 | |
cpe:2.3:h:siemens:tim_1531_irc:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:siemens:sinumerik_one_firmware:*:*:*:*:*:*:*:* | 1 | OR | 2.0.1 | |
cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:N/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- COMPLETE
- Base Score
- 7.1
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 6.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1921438 | Issue Tracking Mitigation Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/ | |
https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html | Mailing List Mitigation Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07 | Third Party Advisory US Government Resource |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-27827 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:58:36 | Added to TrackCVE | |||
2022-12-06 00:02:15 | 2021-03-18T17:15Z | 2021-03-18T17:15:13 | CVE Published Date | updated |
2022-12-06 00:02:15 | 2022-10-07T02:53:51 | CVE Modified Date | updated | |
2022-12-06 00:02:15 | Analyzed | Vulnerability Status | updated | |
2023-04-19 04:44:27 | 2023-04-19T04:15:30 | CVE Modified Date | updated | |
2023-04-19 04:44:27 | Analyzed | Modified | Vulnerability Status | updated |
2023-04-19 04:44:27 | References | updated | ||
2023-04-20 06:12:10 | 2023-04-20T05:15:37 | CVE Modified Date | updated | |
2023-04-20 06:12:10 | References | updated | ||
2023-04-20 08:11:56 | 2023-04-20T07:15:06 | CVE Modified Date | updated | |
2023-04-20 08:11:57 | References | updated |