CVE Vulnerabilities

CVE-2020-13529

Authentication Bypass by Spoofing

Published: May 10, 2021 | Modified: Nov 07, 2023
CVSS 3.x
6.1
MEDIUM
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
2.9 LOW
AV:A/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.1 MODERATE
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
Ubuntu
LOW

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

Weakness

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Affected Software

Name Vendor Start Version End Version
Systemd Systemd_project 245 (including) 245 (including)
Red Hat Enterprise Linux 8 RedHat NetworkManager-1:1.32.10-4.el8 *
Red Hat Enterprise Linux 8 RedHat NetworkManager-1:1.32.10-4.el8 *
Systemd Ubuntu bionic *
Systemd Ubuntu devel *
Systemd Ubuntu esm-infra-legacy/trusty *
Systemd Ubuntu esm-infra/xenial *
Systemd Ubuntu focal *
Systemd Ubuntu groovy *
Systemd Ubuntu hirsute *
Systemd Ubuntu impish *
Systemd Ubuntu jammy *
Systemd Ubuntu kinetic *
Systemd Ubuntu lunar *
Systemd Ubuntu mantic *
Systemd Ubuntu noble *
Systemd Ubuntu oracular *
Systemd Ubuntu trusty *
Systemd Ubuntu trusty/esm *
Systemd Ubuntu xenial *

References