The Treck TCP/IP stack before 6.0.1.66 allows Remote Code Execution, related to IPv4 tunneling.
Published: 2020-06-17
Researchers discovered 19 new zero-day vulnerabilities in a TCP/IP software library developed by Treck. Dubbed Ripple20, the batch includes CVE-2020-11901, which has the potential to allow control of an internet-connected device. Update June 24, 2020: We’ve updated the Identifying affected systems section to include an additional link to a newly released Tenable plugin as well as additional information for our tenable.ot customers.
https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective
https://www.kb.cert.org/vuls/id/257161/
https://www.kb.cert.org/vuls/id/257161
https://www.jsof-tech.com/ripple20/
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04012en_us
https://security.netapp.com/advisory/ntap-20200625-0006/
https://jsof-tech.com/vulnerability-disclosure-policy/
https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt