The Treck TCP/IP stack before 5.0.1.35 has an Out-of-Bounds Write via multiple malformed IPv6 packets.
Published: 2020-06-17
Researchers discovered 19 new zero-day vulnerabilities in a TCP/IP software library developed by Treck. Dubbed Ripple20, the batch includes CVE-2020-11901, which has the potential to allow control of an internet-connected device. Update June 24, 2020: We’ve updated the Identifying affected systems section to include an additional link to a newly released Tenable plugin as well as additional information for our tenable.ot customers.
https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective
https://www.kb.cert.org/vuls/id/257161/
https://www.kb.cert.org/vuls/id/257161
https://www.jsof-tech.com/ripple20/
https://www.dell.com/support/article/de-de/sln321836/dell-response-to-the-ripple20-vulnerabilities
https://jsof-tech.com/vulnerability-disclosure-policy/
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-006.txt