Authentication Bypass

Affecting systemd package, versions <237-3ubuntu10.49

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

NVD Description

Note: Versions mentioned in the description apply to the upstream systemd package. See Remediation section below for Ubuntu:18.04 relevant versions.

An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.

Remediation

Upgrade Ubuntu:18.04 systemd to version 237-3ubuntu10.49 or higher.

References

CVSS Score

6.1
low severity
  • Attack Vector
    Adjacent
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Changed
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
CVE
CVE-2020-13529
CWE
CWE-290
Snyk ID
SNYK-UBUNTU1804-SYSTEMD-1290723
Disclosed
10 May, 2021
Published
11 May, 2021